CVE-2025-5067

5.4 MEDIUM

📋 TL;DR

This vulnerability allows attackers to spoof browser UI elements like tab titles and URLs via malicious web pages. It affects all users running vulnerable versions of Google Chrome on any platform. The attack requires user interaction with a crafted page.

💻 Affected Systems

Products:
  • Google Chrome
  • Chromium-based browsers
Versions: All versions prior to 137.0.7151.55
Operating Systems: Windows, macOS, Linux, ChromeOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All standard Chrome installations are vulnerable. Extensions or security settings don't mitigate this specific issue.

📦 What is this software?

Chrome by Google

Google Chrome is the world's most popular web browser, used by over 3 billion users globally across Windows, macOS, Linux, Android, and iOS platforms. As a Chromium-based browser developed by Google, Chrome dominates the browser market with approximately 65% market share, making it a critical compon...

Learn more about Chrome →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Phishing attacks where users are tricked into entering credentials on fake login pages that appear legitimate due to UI spoofing.

🟠

Likely Case

Limited phishing attempts or deceptive websites that misrepresent their content through manipulated tab displays.

🟢

If Mitigated

Minimal impact if users are trained to verify URLs in address bar and use security extensions.

🌐 Internet-Facing: MEDIUM - Attack requires user to visit malicious site but can affect any Chrome user.
🏢 Internal Only: LOW - Internal applications typically don't need UI spoofing for legitimate purposes.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to visit attacker-controlled webpage but no authentication needed. No public exploit code available yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 137.0.7151.55 and later

Vendor Advisory: https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html

Restart Required: Yes

Instructions:

1. Open Chrome 2. Click three-dot menu → Help → About Google Chrome 3. Chrome will check for updates and install if available 4. Click 'Relaunch' to restart Chrome

🔧 Temporary Workarounds

Disable JavaScript (temporary)

all

Prevents malicious scripts from exploiting the vulnerability but breaks most websites

chrome://settings/content/javascript → Block

Use site isolation

all

Enhances Chrome's site isolation feature for additional protection

chrome://flags/#site-isolation-trial-opt-out → Disabled

🧯 If You Can't Patch

  • Use alternative browsers until Chrome can be updated
  • Implement web filtering to block known malicious sites and suspicious domains

🔍 How to Verify

Check if Vulnerable:

Check Chrome version in About Google Chrome page. If version is below 137.0.7151.55, system is vulnerable.

Check Version:

chrome://version/ or 'google-chrome --version' (Linux/Mac)

Verify Fix Applied:

Confirm Chrome version is 137.0.7151.55 or higher in About Google Chrome page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual tab title changes
  • URL mismatches between address bar and page content

Network Indicators:

  • Connections to newly registered domains with suspicious naming patterns

SIEM Query:

web.url contains 'chrome://' AND web.title != expected_title

🔗 References

📤 Share & Export