Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Chrome vulnerability allowing account takeover fixed
2 min Security

Chrome vulnerability allowing account takeover fixed

Berry ZwetsMay 15, 2025 3:54 pmMay 15, 2025 3:54 pm
Chrome vulnerability allowing account takeover fixed

Google has released an emergency update for the Chrome browser to fix a serious security vulnerability. This vulnerability allowed someone to completely take over accounts.

According to Google, the bug, known as CVE-2025-4664, already has a publicly available exploit, which usually indicates active abuse. Users are advised to update their browser to the latest version as soon as possible.

Security researcher Vsevolod Kokorin of Solidlab discovered and analyzed the vulnerability. The problem lies in Chrome’s Loader component, which allows malicious actors to leak data between different sources via specially designed HTML pages.

How the vulnerability works

“Unlike other browsers, Chrome resolves the Link header on subresource requests. But what’s the problem? The issue is that the Link header can set a referrer-policy. We can specify unsafe-url and capture the full query parameters,” Kokorin explains.

According to the researcher, query parameters can contain sensitive information, such as data used in OAuth authentication flows. This can lead to complete account takeover. “Developers rarely consider the possibility of stealing query parameters via an image from a 3rd-party resource,” he adds.

Google has fixed the issue for Chrome users in the Stable Desktop channel. The updated versions (136.0.7103.113 for Windows/Linux and 136.0.7103.114 for macOS) are being rolled out to all users.

Tip: Google patches critical vulnerability in Chrome

Tags:

account takeover / browser security / Google Chrome / security vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

After retaining Chrome, Google fears split from advertising service

Google can keep Chrome and Android, avoiding a messy breakup

Is Chrome being acquired by Perplexity for 30 billion?

Google’s AI Big Sleep discovers twenty new security vulnerabilities in open source

Editor picks

Qualcomm’s vision: you’re the maestro, AI is your ensemble

The most personal technology ever

Claude Sonnet 4.5 can code autonomously for 30 hours

Anthropic claims that Claude Sonnet 4.5 is the best code model in the...

Why human-centric security cannot do without AI

In practice, hacking people often proves easier than directly attacki...

ServiceNow makes AI a primary part of its platform with AI Experience

AI no longer optional

Techzine.tv

ServiceNow goes after the mid-market with its AI-based Core Business Suite

ServiceNow goes after the mid-market with its AI-based Core Business Suite

Oracle Database @ AWS: best of both worlds?

Oracle Database @ AWS: best of both worlds?

Managing the AI chaos with ServiceNow's AI Control Tower

Managing the AI chaos with ServiceNow's AI Control Tower

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Infor's industry-specific ERP strategy and Velocity Suite deep dive

Read more on Security

IoT routers driving SMS phishing

IoT routers driving SMS phishing

Researchers at Sekoia.io have found that cybercriminals are exploiting Milesight cellular routers on a large ...

Mels Dees 13 hours ago
Why human-centric security cannot do without AI
Top story

Why human-centric security cannot do without AI

In practice, hacking people often proves easier than directly attacking systems. The vast majority of cyberat...

Berry Zwets September 26, 2025
Okta weaves AI agents deep into the identity fabric
Top story

Okta weaves AI agents deep into the identity fabric

During Oktane25, Okta is focusing on agentic AI. Agent identities are becoming "first-class citizens" within ...

Erik van Klinken September 25, 2025
Red Hat hit by GitLab breach: 570GB stolen, including client info

Red Hat hit by GitLab breach: 570GB stolen, including client info

Update 5:30 PM CEST: Red Hat has offered a correction to the article. "The security incident we are investiga...

Erik van Klinken 7 hours ago

Expert Talks

How Split-Second Data Performance and Sovereignty Keep the Netherlands Moving

How Split-Second Data Performance and Sovereignty Keep the Netherlands Moving

Dutch enterprises are combining open-source foundations with enterpri...

How to Recover My Archived PST Files in Outlook?

How to Recover My Archived PST Files in Outlook?

An archive PST file in Outlook is a file in which older emails and ot...

The AI productivity mirage: why leaders are aiming at the wrong target

In the never-ending quest for developer productivity gains, a new def...

Meeting future workload demands: the case for emerging memory technologies

It often feels as though memory is an outlier in the technology world...

Tech calendar

National 6G Conference

October 7, 2025 Delft

Innovation Week 2025

October 9, 2025 Prague

The Next Chapter in Cybersecurity with Imperva + Thales

October 15, 2025

Luxembourg Venture Days

October 22, 2025 Luxembourg

Dell Technologies Forum

November 13, 2025 Nieuwegein

BrickCon The Databricks Community Conference

December 3, 2025 Orlando, Florida

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2025 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement