Skip to content
Techzine Global
  • Home
  • Topstories
  • Topics
    • Analytics
    • Applications
    • Collaboration
    • Data Management
    • Devices
    • Devops
    • Infrastructure
    • Privacy & Compliance
    • Security
  • Insights
    • All Insights
    • Agentic AI
    • Analytics
    • Cloud ERP
    • Generative AI
    • IT in Retail
    • NIS2
    • RSAC 2025 Conference
    • Security Platforms
    • SentinelOne
  • More
    • Become a partner
    • About us
    • Contact us
    • Terms and conditions
    • Privacy Policy
  • Techzine Global
  • Techzine Netherlands
  • Techzine Belgium
  • Techzine TV
  • ICTMagazine Netherlands
  • ICTMagazine Belgium
Techzine » News » Security » Chrome vulnerability allowing account takeover fixed
2 min Security

Chrome vulnerability allowing account takeover fixed

Berry ZwetsMay 15, 2025 3:54 pmMay 15, 2025 3:54 pm
Chrome vulnerability allowing account takeover fixed

Google has released an emergency update for the Chrome browser to fix a serious security vulnerability. This vulnerability allowed someone to completely take over accounts.

According to Google, the bug, known as CVE-2025-4664, already has a publicly available exploit, which usually indicates active abuse. Users are advised to update their browser to the latest version as soon as possible.

Security researcher Vsevolod Kokorin of Solidlab discovered and analyzed the vulnerability. The problem lies in Chrome’s Loader component, which allows malicious actors to leak data between different sources via specially designed HTML pages.

How the vulnerability works

“Unlike other browsers, Chrome resolves the Link header on subresource requests. But what’s the problem? The issue is that the Link header can set a referrer-policy. We can specify unsafe-url and capture the full query parameters,” Kokorin explains.

According to the researcher, query parameters can contain sensitive information, such as data used in OAuth authentication flows. This can lead to complete account takeover. “Developers rarely consider the possibility of stealing query parameters via an image from a 3rd-party resource,” he adds.

Google has fixed the issue for Chrome users in the Stable Desktop channel. The updated versions (136.0.7103.113 for Windows/Linux and 136.0.7103.114 for macOS) are being rolled out to all users.

Tip: Google patches critical vulnerability in Chrome

Tags:

account takeover / browser security / Google Chrome / security vulnerability

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Stay tuned, subscribe!

Nieuwsbrieven*

Related

Over 40,000 OpenClaw agents vulnerable

Vulnerable AI platform n8n: full control over instances possible

Cloudflare vulnerability made every host accessible

Multiple vulnerabilities found in Anthropic’s Git MCP server

Editor picks

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 certification is anything but easy. Nevertheless, security ...

Java gains ground for production AI as Oracle loses its grip

The development of AI is producing multiple winners and losers among ...

Silicon One is the engine under the hood of Cisco’s AI story

Doubling throughput for AI networks

Imec opens NanoIC line for ultra-advanced chips

The Belgian research institute imec opened the NanoIC pilot on Monday...

Techzine.tv

How Capgemini transformed HR for 400,000 employees globally

How Capgemini transformed HR for 400,000 employees globally

"Not all clouds are created equal" in the AI era: how is OCI different?

"Not all clouds are created equal" in the AI era: how is OCI different?

SAP's AI workforce strategy: upskilling 100,000 employees

SAP's AI workforce strategy: upskilling 100,000 employees

Why your SOC needs a ROC, according to Qualys

Why your SOC needs a ROC, according to Qualys

Read more on Security

Major hack of Dutch telco Odido was a classic case of social engineering

Major hack of Dutch telco Odido was a classic case of social engineering

Customer support got found out multiple times

Erik van Klinken 2 days ago
Anthropic Claude hacked: LLM becomes malware factory in eight hours
Top story

Anthropic Claude hacked: LLM becomes malware factory in eight hours

Psychological games with Claude

Sander Almekinders January 29, 2026
Proofpoint acquires AI security company Acuvity

Proofpoint acquires AI security company Acuvity

Proofpoint has announced the acquisition of Acuvity, which provides tooling for AI security and governance. T...

Berry Zwets 2 days ago
ISO 27001 inspires confidence, but it is only the beginning
Top story

ISO 27001 inspires confidence, but it is only the beginning

ISO 27001 certification is anything but easy. Nevertheless, security standards create a false sense of securi...

Erik van Klinken February 9, 2026

Expert Talks

4 steps to create a future-proof data infrastructure

4 steps to create a future-proof data infrastructure

A future-proof IT infrastructure is often positioned as a universal s...

Secure networking: the foundation for the AI era

Secure networking: the foundation for the AI era

As organizations get ready to roll out AI to change their business pr...

Why AI adoption requires a dedicated approach to cyber governance

AI tools are spreading through the enterprise ecosystem at an astonis...

Professional print materials for European tech events, why booth design still makes the difference

When you participate in a major tech event, you naturally want to sta...

Tech calendar

Appdevcon

March 10, 2026 Amsterdam

Webdevcon

March 10, 2026 Amsterdam

Dutch PHP Conference

March 10, 2026 Amsterdam

De IT Afdeling van de toekomst

March 31, 2026 Naaldwijk

GITEX ASIA 2026

April 8, 2026 Singapore

Southeast Asia AI Application Summit 2026

April 23, 2026 Bangkok

Whitepapers

Experience Synology’s latest enterprise backup solution

Experience Synology’s latest enterprise backup solution

How do you ensure your company data is both secure and quickly recove...

How to choose the right Enterprise Linux platform?

How to choose the right Enterprise Linux platform?

"A Buyer's Guide to Enterprise Linux" comprehensively analyzes the mo...

Enhance your data protection strategy for 2025

The Data Protection Guide 2025 explores the essential strategies and...

Strengthen your cybersecurity with DNS best practices

The white paper "DNS Best Practices" by Infoblox presents essential g...

Techzine Global

Techzine focusses on IT professionals and business decision makers by publishing the latest IT news and background stories. The goal is to help IT professionals get acquainted with new innovative products and services, but also to offer in-depth information to help them understand products and services better.

Follow us

Twitter
LinkedIn
YouTube

© 2026 Dolphin Publications B.V.
All rights reserved.

Techzine Service

  • Become a partner
  • Advertising
  • About Us
  • Contact
  • Terms & Conditions
  • Privacy Statement