Google has released an emergency security update to address a newly discovered Chrome zero day vulnerability, identified as CVE-2025-13223. The flaw was already being exploited in active attacks when the patch was issued. According to Google, this is the seventh Chrome zero day vulnerability targeted by threat actors this year, continuing a pattern of aggressive exploitation against the browser’s underlying JavaScript engine and memory handling components.
The vulnerability exists within the V8 JavaScript engine and stems from a critical type confusion weakness. Type confusion issues occur when a program misinterprets the type of an object during execution, which can lead to memory corruption, unexpected behavior, or arbitrary code execution. Attackers often target these flaws to escape browser sandboxes or run malicious code on a user’s system. In this case, Google confirmed that threat actors were already taking advantage of CVE-2025-13223 in real world attacks before the fix was released.
Google’s Threat Analysis Group, a security team that frequently uncovers state aligned cyber activity and targeted spyware operations, discovered and reported the flaw on November 12. TAG researchers regularly track sophisticated threat campaigns that target journalists, political figures, activists, and individuals who handle sensitive information. Zero days involving V8 are commonly linked to high value surveillance operations, making the discovery and patch of CVE-2025-13223 particularly important.
Patch Details and Updated Versions
Google deployed the fix through an emergency Stable Channel update. Users on Windows, macOS, and Linux should receive the patched versions automatically. The company confirmed the following builds include the security fix:
- Windows: 142.0.7444.175 and 142.0.7444.176
- macOS: 142.0.7444.176
- Linux: 142.0.7444.175
The full announcement is available in Google’s official release bulletin. As with many Chrome zero day vulnerability disclosures, technical information remains restricted until most users have upgraded. This prevents threat actors from reverse engineering the fix and expanding exploitation to a wider audience.
Although Chrome updates typically install automatically in the background, users can verify they are protected by opening the Chrome menu, navigating to Help, selecting About Google Chrome, and allowing the browser to check for updates. A restart is required to activate the security patch.
What Makes CVE-2025-13223 High Severity
The Chrome zero day vulnerability CVE-2025-13223 impacts V8, the engine responsible for executing JavaScript. V8 is a complex component that handles memory intensive processes at high speed. Type confusion flaws within V8 are particularly dangerous because they allow attackers to manipulate memory structures that control how the browser operates. In several previous cases, exploitation of V8 vulnerabilities has led to:
- Unauthorized code execution
- Browser sandbox escapes
- Drive by downloads
- Malicious document manipulation
- Privilege escalation
When combined with other weaknesses or delivered through targeted attack chains, these vulnerabilities enable highly sophisticated intrusions. Threat groups often embed zero day exploits within malicious websites, booby trapped links, messaging apps, or specially crafted files. Because V8 flaws typically require only a single interaction from the victim, they remain a favored choice among advanced threat actors seeking stealthy infection methods.
Part of a Larger Trend of Chrome Zero Day Exploitation
CVE-2025-13223 is the seventh actively exploited Chrome zero day vulnerability patched this year. The surge in exploitation reflects the browser’s central role in communication, work, and daily digital activity. Threat actors increasingly view Chrome as an ideal entry point for both targeted and widespread attacks.
Google previously patched six other zero days in 2025:
- Two exploited type confusion flaws discovered in July and September
- A high severity account hijacking zero day fixed in May
- A sandbox escape reported by Kaspersky after attacks on Russian media
- Out of bounds memory issues reported by Google TAG in June
- A May exploit enabling session compromise through crafted web content
This follows a busy 2024, when Google addressed ten additional Chrome zero day vulnerabilities across Pwn2Own demonstrations, spyware campaigns, and state aligned cyber operations.
Who Is Likely Behind the Exploitation
While Google has not yet disclosed details of the active exploitation surrounding CVE-2025-13223, the involvement of the Threat Analysis Group strongly suggests the flaw was used in highly targeted attacks. TAG commonly identifies zero days weaponized by government backed threat actors and commercial surveillance vendors. These operations typically target individuals who store, transmit, or access sensitive political or journalistic information.
In previous incidents, TAG has linked V8 zero day exploitation to spyware companies, surveillance tool operators, and nation state aligned threat groups. These attackers frequently leverage zero day vulnerabilities to compromise devices without alerting victims. Given that exploitation was detected before disclosure, CVE-2025-13223 may have been circulating among advanced actors who rely on stealth and long term persistence.
How Users and Organizations Can Protect Themselves
The most effective protection is to update Google Chrome immediately. Users should confirm installation of version 142.0.7444.175 or .176 depending on their system. Beyond patching, organizations and individuals should remain alert to broader risks associated with Chrome zero day vulnerability exploitation. Recommended steps include:
- Enable automatic updates for all browsers and extensions
- Use exploit protection tools that detect memory corruption attacks
- Limit the use of outdated browser extensions or untrusted plugins
- Monitor for unusual browser behavior or session anomalies
- Scan devices regularly with reputable tools such as Malwarebytes
High risk individuals, such as journalists, political activists, and researchers, should consider integrating Google’s Advanced Protection Program for enhanced safeguards against targeted attacks.
Additional Chrome Security Improvements
During the November rollout, Google also patched a second high severity V8 type confusion vulnerability, CVE-2025-13224, reported by Google Big Sleep. Although there is no current evidence that this flaw is being exploited in the wild, it demonstrates continued attacker interest in weaknesses within V8’s memory operations. Google credited researchers who contributed to identifying vulnerabilities before they could be abused.
Google’s security teams emphasized that many of the issues found in Chrome are detected using advanced instrumentation tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity auditing, and coverage guided fuzzers. These automated detection systems help uncover logic flaws before attackers discover them, reducing the likelihood of future exploitation.
Ongoing Tracking of the Chrome Zero Day Vulnerability
Google will likely publish more information on the exploitation chain once a majority of users have installed the update and the risk of widespread abuse decreases. Security researchers are monitoring for indicators that CVE-2025-13223 may be linked to known threat groups or previously documented attack campaigns. The company is expected to release additional technical context when restrictions on disclosure are lifted.
As new details emerge, updates on the Chrome zero day vulnerability will be available in the cybersecurity section for continued tracking and analysis.

