One of the critical flaws patched in the latest Chrome update now has public exploit code, raising fresh concerns for millions of users.

Quick Summary – TLDR:

  • Google released Chrome version 141.0.7390.65/.66 with patches for three serious vulnerabilities
  • One of the flaws, a bug in Chrome’s V8 engine, now has a full public exploit available
  • Researchers demonstrated remote code execution using a sandbox bypass and crafted WebAssembly types
  • Users and enterprises are urged to update immediately to prevent exploitation

What Happened?

Google pushed a new Chrome update across Windows, macOS, and Linux to fix three major security vulnerabilities, two of which are considered high severity. The most critical of them, involving Chrome’s V8 JavaScript engine, has already been publicly exploited with technical details and proof-of-concept code now circulating online.

Critical Bugs Found and Patched

The latest update, Chrome 141.0.7390.65/.66, includes three security fixes, each reported by external security researchers and rewarded through Google’s vulnerability program. All of them involve improper memory handling which can be exploited by visiting malicious web pages:

  • CVE-2025-11458 (High Severity): A heap buffer overflow in Chrome Sync. Reported by “raven” from KunLun Lab, who received a $5,000 reward.
  • CVE-2025-11460 (High Severity): A use-after-free flaw in Chrome’s Storage component. Discovered by Sombra, reward still pending.
  • CVE-2025-11211 (Medium Severity): An out-of-bounds read in the WebCodecs API. Reported by Jakob Košir and rewarded with $3,000.

These vulnerabilities could allow attackers to run arbitrary code in the browser simply by luring users to open a malicious website or advertisement. No elevated privileges are needed, making them dangerous in real-world scenarios.

Exploit Code Released for V8 Bug

The biggest concern comes from a newly published exploit targeting a V8 engine flaw that Google quietly patched in Chrome M137. The exploit showcases a deep technical chain of abuse starting from a type confusion vulnerability in WebAssembly.

Security researcher Seunghyun Lee (0x10n), who earned top recognition at TyphoonPWN 2025, crafted the exploit using a technique that triggers nullability confusion in recursive type groups. By leveraging a birthday attack on Chrome’s MurmurHash64A function, attackers can manipulate how WebAssembly types are interpreted, effectively sidestepping safety checks.

In addition, the exploit uses a sandbox bypass via JS Promise Integration (JSPI) flaws. By spraying attacker-controlled data and abusing suspended stack frames, the exploit builds a return-oriented programming (ROP) chain to invoke VirtualProtect and run arbitrary shellcode.

The publicly available proof-of-concept even demonstrates launching the Windows Calculator app (calc.exe) as a live test of the exploit’s effectiveness.

Why It Matters?

While Google has already patched the V8 vulnerability, the release of exploit code puts unpatched systems at serious risk. If users or organizations have not yet updated, they may be vulnerable to drive-by attacks where no user interaction is needed beyond visiting a rigged website.

What You Should Do Now?

  • Update Chrome to version 141.0.7390.65/.66 immediately. Most users will receive it automatically, but it can be manually checked via Chrome settings under “About Google Chrome.”
  • Enterprises using managed environments should prioritize deployment across all endpoints.
  • Developers and sysadmins should strengthen site defenses using Content Security Policy (CSP) and validate all user inputs.
  • Security teams are encouraged to adopt runtime memory safety tools like AddressSanitizer and Control Flow Integrity during development.

SQ Magazine Takeaway

Honestly, this one is a wake-up call. It’s not every day you see exploit code for a major browser like Chrome go public so quickly after a patch. This could lead to widespread misuse if users don’t act fast. What’s more concerning is how sophisticated the attack chain is, combining low-level WebAssembly quirks with stack manipulation. I’ve already updated my browser, and I recommend you do the same before attackers start automating these exploits in malware kits.

Add SQ Magazine as a Preferred Source on Google for updates!Follow on Google News
Sofia Ramirez

Sofia Ramirez

Senior Tech Writer


Sofia Ramirez is a technology and cybersecurity writer at SQ Magazine. With a keen eye on emerging threats and innovations, she helps readers stay informed and secure in today’s fast-changing tech landscape. Passionate about making cybersecurity accessible, Sofia blends research-driven analysis with straightforward explanations; so whether you’re a tech professional or a curious reader, her work ensures you’re always one step ahead in the digital world.
Disclaimer: Content on SQ Magazine is for informational and educational purposes only. Please verify details independently before making any important decisions based on our content.

Reader Interactions

Leave a Comment

  • Artificial Intelligence
  • Cybersecurity
  • Gaming
  • Internet
  • PR