CVE-2025-13107

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to create deceptive UI elements that appear legitimate but are actually malicious, enabling phishing or clickjacking attacks. It affects users running Google Chrome versions before 140.0.7339.80 on any operating system.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 140.0.7339.80
Operating Systems: Windows, macOS, Linux, ChromeOS, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Chromium-based browsers may also be affected depending on their update cycle.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be tricked into entering sensitive information into fake login forms, clicking malicious buttons, or downloading malware by trusting spoofed UI elements.

🟠

Likely Case

Phishing attacks where attackers create convincing fake login prompts or dialog boxes that users interact with, potentially leading to credential theft.

🟢

If Mitigated

Users who verify URLs before entering credentials and use security extensions would be protected from most exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction with a crafted webpage. No authentication needed to serve malicious content.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 140.0.7339.80 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/09/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome. 2. Click the three-dot menu → Help → About Google Chrome. 3. Chrome will automatically check for and install updates. 4. Click 'Relaunch' to restart Chrome with the update.

🔧 Temporary Workarounds

Disable JavaScript for untrusted sites

all

Prevents execution of malicious scripts that could exploit the compositing vulnerability

chrome://settings/content/javascript → Add site to Block list

🧯 If You Can't Patch

  • Use browser extensions that warn about suspicious UI elements or block known malicious sites
  • Implement network filtering to block access to known malicious domains serving crafted HTML pages

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: Open Chrome → Click three-dot menu → Help → About Google Chrome. If version is below 140.0.7339.80, you are vulnerable.

Check Version:

google-chrome --version (Linux/Mac) or navigate to chrome://version

Verify Fix Applied:

After updating, verify version is 140.0.7339.80 or higher in About Google Chrome page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user reports of suspicious dialog boxes or UI elements
  • Increased visits to domains with unusual HTML structures

Network Indicators:

  • Traffic to domains serving complex HTML pages with unusual compositing elements
  • User interactions with pages that have abnormal rendering patterns

SIEM Query:

source="chrome_logs" AND (event="dialog_interaction" OR event="unusual_ui_element")

🔗 References

📤 Share & Export