CVE-2025-12911

4.3 MEDIUM

📋 TL;DR

This vulnerability in Google Chrome allows attackers to create deceptive UI elements that mimic legitimate browser permissions prompts. Users running vulnerable Chrome versions could be tricked into granting permissions they didn't intend to grant. The attack requires user interaction with a malicious webpage.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: Versions prior to 140.0.7339.80
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or enterprise policies might affect exploitability.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into granting sensitive permissions (like camera, microphone, or location access) to malicious websites, leading to privacy violations or credential theft through convincing phishing interfaces.

🟠

Likely Case

Attackers create convincing fake permission prompts that trick users into clicking 'Allow' for notifications or other permissions, leading to spam notifications or minor privacy intrusions.

🟢

If Mitigated

With proper user awareness training and browser security settings, users would recognize suspicious prompts and avoid granting permissions to untrusted sites.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction with a crafted HTML page. No authentication needed to serve the malicious page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 140.0.7339.80 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu. 3. Go to Help > About Google Chrome. 4. Chrome will automatically check for and install updates. 5. Click 'Relaunch' to restart Chrome with the update.

🔧 Temporary Workarounds

Disable automatic permission prompts

all

Configure Chrome to ask before allowing sites to send notifications or access sensitive features

chrome://settings/content/notifications
chrome://settings/content

Use site permissions review

all

Regularly review and clear granted permissions for websites

chrome://settings/content/all

🧯 If You Can't Patch

  • Use browser extensions that block permission prompts from unknown sites
  • Train users to never grant permissions to unfamiliar websites and to verify URLs before interacting with prompts

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in Settings > About Chrome. If version is below 140.0.7339.80, the system is vulnerable.

Check Version:

chrome://version/

Verify Fix Applied:

After updating, verify Chrome version is 140.0.7339.80 or higher in Settings > About Chrome.

📡 Detection & Monitoring

Log Indicators:

  • Multiple permission grants from same domain in short timeframe
  • Unusual permission patterns in browser logs

Network Indicators:

  • HTTP requests to domains with recently registered certificates
  • Suspicious iframe loading patterns

SIEM Query:

source="chrome_audit_log" AND event="permission_granted" AND count by domain > threshold

🔗 References

📤 Share & Export