8.8 CVE-2025-3069
Inappropriate implementation in Extensions in Google Chrome prior to 135.0.7049.52 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)
https://nvd.nist.gov/vuln/detail/CVE-2025-3069
Categories
CWE-358 : Improperly Implemented Security Check for Standard
The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design of a standardized algorithm, protocol, or technique. Browser does not verify Basic Constraints of a certificate, even though it is required, allowing spoofing of trusted certificates. Browser does not verify Basic Constraints of a certificate, even though it is required, allowing spoofing of trusted certificates. Browser does not verify Basic Constraints of a certificate, even though it is required, allowing spoofing of trusted certificates. Logic error prevents some required conditions from being enforced during Challenge-Response Authentication Mechanism with MD5 (CRAM-MD5). Shared secret not verified in a RADIUS response packet, allowing authentication bypass by spoofing server replies. Insufficient verification in VoIP implementation, in violation of standard, allows spoofed messages. Insufficient verification in VoIP implementation, in violation of standard, allows spoofed messages. Security check not applied to all components, allowing bypass.
References
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:* | < 135.0.7049.52 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
No entry |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
