CVE-2025-4664 Overview
Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
Critical Impact
Allows cross-origin data leakage that can lead to data privacy concerns for users.
Affected Products
- Google Chrome
Discovery Timeline
- Not Available - Vulnerability discovered by Not Available
- Not Available - Responsible disclosure to Google
- Not Available - CVE CVE-2025-4664 assigned
- Not Available - Google releases security patch
- 2025-05-14T18:15:33.867 - CVE CVE-2025-4664 published to NVD
- 2025-06-06T01:00:02.617 - Last updated in NVD database
Technical Details for CVE-2025-4664
Vulnerability Analysis
The vulnerability arises from insufficient policy enforcement in the Loader component. This flaw allows an attacker to exploit cross-origin resource sharing and access confidential information from different origins.
Root Cause
The vulnerability is due to a lack of proper checks and balances in the Loader component when loading cross-origin resources.
Attack Vector
The attack can be executed remotely by crafting a malicious HTML page that bypasses the browser's security features to read data across origins.
// Example exploitation code (sanitized)
fetch('https://victim-website.com/data')
.then(response => response.text())
.then(data => console.log(data));
Detection Methods for CVE-2025-4664
Indicators of Compromise
- Unusual network requests to known or unknown domains
- Excessive cross-origin requests in browser activity logs
- Suspicious HTML pages accessed frequently
Detection Strategies
Implement browser logging for unusual cross-origin network requests and analyze logs for accessing restricted domains.
Monitoring Recommendations
Continuous monitoring of network requests and applying anomaly detection on request patterns can help identify exploitation attempts.
How to Mitigate CVE-2025-4664
Immediate Actions Required
- Update Google Chrome to version 136.0.7103.113 or later.
- Implement strict Content Security Policy (CSP) headers.
- Regularly audit cross-origin requests in application logs.
Patch Information
Ensure Chrome is updated to at least version 136.0.7103.113 where Google has patched this vulnerability.
Workarounds
Develop a custom browser extension that blocks unauthorized cross-origin requests based on a predefined policy.
# Configuration example
echo "User-Agent: Chrome/136.0.7103.113" > ~/.chrome_config
start chrome --crash-test
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

