Close Menu
IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
  • Home
  • News
  • Blog
  • Selfhosting
  • AI
  • Linux
  • Cyber Security
  • Gadgets
  • Gaming

Subscribe to Updates

Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

    What's Hot

    Watch out for these traps lurking in search results

    May 15, 2025

    Predictive Maintenance Proving Out as Successful AI Use Case 

    May 15, 2025

    Are phones making teens more conflict-averse?

    May 15, 2025
    Facebook X (Twitter) Instagram
    Facebook Mastodon Bluesky Reddit
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    • Home
    • News
    • Blog
    • Selfhosting
    • AI
    • Linux
    • Cyber Security
    • Gadgets
    • Gaming
    IOupdate | IT News and SelfhostingIOupdate | IT News and Selfhosting
    Home»Cyber Security»New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy
    Cyber Security

    New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy

    MichaBy MichaMay 15, 2025No Comments3 Mins Read
    New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy


    This article discusses recent security updates released by Google for its Chrome browser, addressing critical vulnerabilities including CVE-2025-4664 that pose risks of data leakage. The importance of regular browser updates for cybersecurity is emphasized, along with tips for safeguarding personal data.

    Essential Chrome Security Updates: Addressing Critical Vulnerabilities

    On May 15, 2025, Google released important updates for its Chrome web browser, targeting four identified security vulnerabilities. One of these vulnerabilities, tracked as CVE-2025-4664, is particularly severe, with an ample risk of exploitation in the wild.

    Understanding CVE-2025-4664

    The high-severity vulnerability has a CVSS score of 4.3 and features insufficient policy enforcement within a component known as Loader. According to Google, this flaw can allow remote attackers to leak cross-origin data via specially crafted HTML pages.

    Security researcher Vsevolod Kokorin first detailed this vulnerability on May 5, 2025. The fact that an exploit for CVE-2025-4664 already exists highlights the urgency for all Chrome users to act swiftly.

    Mechanism of Exploitation

    In a series of posts, Kokorin explained that unlike other browsers, Chrome processes the Link header on sub-resource requests. This unique approach can lead to serious vulnerabilities due to how it handles referrer policies, which could potentially expose sensitive data.

    The exploitation could result in a complete account takeover, particularly if the leaked query parameters contain personal or sensitive information. Attackers can leverage images from third-party resources to extract this data, amplifying the risk even further.

    Why Keeping Your Browser Updated is Crucial for Cybersecurity

    Browser security is more critical than ever, and outdated software makes users vulnerable. Not only do updates protect against identified flaws like CVE-2025-4664, but they also fortify defense mechanisms against newly emerging threats. Implementing best practices for cybersecurity can safeguard against potential breaches.

    Update Recommendations

    To protect against the risks associated with CVE-2025-4664, users are advised to update their Chrome browsers. Ensure that you have version 136.0.7103.113 or later for Windows and Mac, and the same version for Linux. Users of other Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi should also apply the fixes as soon as they are available.

    Unique Cybersecurity Tips

    • Regularly check for browser updates to mitigate risks related to known vulnerabilities.
    • Consider using additional privacy-focused browser extensions to add layers of protection.
    • Monitor your online accounts closely for unusual activities and set up alerts for unauthorized access attempts.

    FAQ

    • What should I do if I’m using an outdated version of Chrome? Immediately update your browser to the latest version to enhance security against known vulnerabilities.
    • How can I stay informed about the latest cyber threats? Follow security blogs, subscribe to cybersecurity newsletters, and monitor reputable tech news sites for real-time updates.
    • Are other browsers affected by vulnerabilities like CVE-2025-4664? While this specific vulnerability affects Chrome, other Chromium-based browsers may also need updates due to shared architecture.

    May 15, 2025Ravie LakshmananBrowser Security / Web Security



    Read the original article

    0 Like this
    Chrome CrossOrigin data Enables Leak Loader Policy Referrer Vulnerability
    Share. Facebook LinkedIn Email Bluesky Reddit WhatsApp Threads Copy Link Twitter
    Previous ArticleBuilding a Media Server with Raspberry Pi: A Comprehensive Guide
    Next Article Harvey reportedly in discussions to raise $250M at $5B valuation

    Related Posts

    Cyber Security

    Watch out for these traps lurking in search results

    May 15, 2025
    Cyber Security

    Patch Tuesday, May 2025 Edition – Krebs on Security

    May 15, 2025
    Cyber Security

    Attacks on the education sector are surging: How can cyber-defenders respond?

    May 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    AI Developers Look Beyond Chain-of-Thought Prompting

    May 9, 202515 Views

    6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

    April 21, 202512 Views

    Andy’s Tech

    April 19, 20259 Views
    Stay In Touch
    • Facebook
    • Mastodon
    • Bluesky
    • Reddit

    Subscribe to Updates

    Get the latest creative news from ioupdate about Tech trends, Gaming and Gadgets.

      About Us

      Welcome to IOupdate — your trusted source for the latest in IT news and self-hosting insights. At IOupdate, we are a dedicated team of technology enthusiasts committed to delivering timely and relevant information in the ever-evolving world of information technology. Our passion lies in exploring the realms of self-hosting, open-source solutions, and the broader IT landscape.

      Most Popular

      AI Developers Look Beyond Chain-of-Thought Prompting

      May 9, 202515 Views

      6 Reasons Not to Use US Internet Services Under Trump Anymore – An EU Perspective

      April 21, 202512 Views

      Subscribe to Updates

        Facebook Mastodon Bluesky Reddit
        • About Us
        • Contact Us
        • Disclaimer
        • Privacy Policy
        • Terms and Conditions
        © 2025 ioupdate. All Right Reserved.

        Type above and press Enter to search. Press Esc to cancel.