- Google Chrome’s unique handling of referrer-policy creates a major loophole for silent data siphoning
- CVE-2025-4664 proves even trusted browsers are not immune to catastrophic zero-day vulnerabilities
- Cross-origin data is up for grabs if you haven’t updated Chrome or Chromium
A newly uncovered zero-day vulnerability which affects both Windows and Linux systems could put billions of Google Chrome and Chromium users at serious risk of data theft, experts have warned.
Researchers from Wazuh claim this flaw – tracked as CVE-2025-4664 – has already drawn urgent attention due to its ability to leak sensitive cross-origin data such as OAuth tokens and session identifiers without user interaction.
The flaw, identified in the Loader component of Chrome and Chromium browsers, relates to how these browsers process the Link HTTP header for sub-resource requests like images or scripts.
Chrome opening the door to data leaks
Unlike other mainstream browsers, Chrome honors the referrer-policy directive even on sub-resources.
This behavior allows a malicious site to inject a lax policy, such as unsafe-url, effectively leaking full URLs, including sensitive data, to third-party domains.
This kind of exploit bypasses conventional browser defenses and directly undermines common security assumptions in web infrastructure.
Wazuh claims it can detect and mitigate this flaw via its Wazuh Vulnerability Detection module, which uses data from its Cyber Threat Intelligence (CTI) service to monitor software versions and raise alerts when vulnerable packages are found.
In a lab environment set up using Wazuh OVA 4.12.0, security researchers demonstrated how endpoints running Windows 11 and Debian 11 could be scanned to identify whether they were running vulnerable versions of Chrome or Chromium.
As noted in Wazuh’s dashboard, users are instructed to add the query CVE-2025-4664 to quickly isolate impacted systems, with the module updating the vulnerability status from “Active” to “Solved” once mitigation steps are verified.
Google has issued an emergency patch to address the issue on Windows and Gentoo Linux systems. Users on these platforms are advised to update their browsers immediately.
For Chromium users on Debian 11, all versions up to 120.0.6099.224 remain vulnerable, and no updated package has yet been released. Users are encouraged to uninstall the browser until a patched version becomes available.
Despite these swift actions, the broader concern remains: how can users and enterprises reliably protect themselves against browser-based zero-day exploits?
Applying patches is essential, but relying solely on browser updates can leave significant gaps. For this reason, it is recommended to use endpoint protection platforms, along with malware protection and antivirus solutions, to stay safe.
These tools provide layered defenses that go beyond browser vulnerabilities, offering real-time detection and containment of exploit attempts.
You might also like
- These are the best VPNs with antivirus that you can use right now
- Take a look at our pick of the best internet security suites available
- ‘Mission: Impossible – The Final Reckoning’ gets surprise guest appearance: a revolutionary 360TB silica storage media
This articles is written by : Nermeen Nabil Khear Abdelmalak
All rights reserved to : USAGOLDMIES . www.usagoldmines.com
You can Enjoy surfing our website categories and read more content in many fields you may like .
Why USAGoldMines ?
USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.