CVE-2025-1923

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers who convince users to install malicious Chrome extensions to perform UI spoofing attacks. The malicious extension can manipulate permission prompts to trick users into granting unintended permissions. Only Chrome users who install malicious extensions are affected.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 134.0.6998.35
Operating Systems: Windows, macOS, Linux, ChromeOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects users who install malicious extensions. Does not affect browsers with extensions disabled.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could spoof legitimate permission prompts to trick users into granting sensitive permissions (camera, microphone, location, notifications) to malicious extensions, potentially leading to data theft or surveillance.

🟠

Likely Case

Users might be tricked into granting unnecessary permissions to seemingly legitimate extensions, allowing those extensions to access more data than intended.

🟢

If Mitigated

With proper extension vetting and user education about only installing trusted extensions from official sources, impact is minimal.

🌐 Internet-Facing: LOW - Requires user interaction to install malicious extension, not directly exploitable via web content.
🏢 Internal Only: LOW - Same requirements as internet-facing; no special internal network advantage.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to convince users to install malicious extension, then technical skill to craft UI spoofing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 134.0.6998.35 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html

Restart Required: Yes

Instructions:

1. Open Chrome menu > Help > About Google Chrome. 2. Chrome will automatically check for updates and install version 134.0.6998.35 or later. 3. Click 'Relaunch' to restart Chrome with the update.

🔧 Temporary Workarounds

Disable Chrome Extensions

all

Temporarily disable all extensions to prevent exploitation while waiting to patch.

chrome://extensions/ > toggle off all extensions

Restrict Extension Installation

all

Configure Chrome policies to prevent users from installing extensions.

Windows: Set ExtensionInstallBlocklist policy to *
macOS/Linux: Configure ExtensionInstallBlacklist

🧯 If You Can't Patch

  • Educate users to only install extensions from Chrome Web Store and verify publisher reputation
  • Implement application allowlisting to prevent unauthorized extension installation

🔍 How to Verify

Check if Vulnerable:

Check Chrome version: if below 134.0.6998.35 and extensions are enabled, system is vulnerable.

Check Version:

chrome://version/ or 'google-chrome --version' in terminal

Verify Fix Applied:

Confirm Chrome version is 134.0.6998.35 or higher via chrome://version/

📡 Detection & Monitoring

Log Indicators:

  • Unusual extension installation events
  • Multiple permission prompt events from same extension

Network Indicators:

  • Extensions making unexpected network requests after permission grants

SIEM Query:

source="chrome_extension_logs" AND (event="permission_granted" OR event="extension_install") | stats count by extension_id

🔗 References

📤 Share & Export