Billions of Chrome users at risk from new data-stealing browser vulnerability – here’s how to stay safe


- Google Chrome’s unique handling of referrer-policy creates a major loophole for silent data siphoning
- CVE-2025-4664 proves even trusted browsers are not immune to catastrophic zero-day vulnerabilities
- Cross-origin data is up for grabs if you haven’t updated Chrome or Chromium
A newly uncovered zero-day vulnerability which affects both Windows and Linux systems could put billions of Google Chrome and Chromium users at serious risk of data theft, experts have warned.
Researchers from Wazuh claim this flaw – tracked as CVE-2025-4664 – has already drawn urgent attention due to its ability to leak sensitive cross-origin data such as OAuth tokens and session identifiers without user interaction.
The flaw, identified in the Loader component of Chrome and Chromium browsers, relates to how these browsers process the Link HTTP header for sub-resource requests like images or scripts.
Chrome opening the door to data leaks
Unlike other mainstream browsers, Chrome honors the referrer-policy directive even on sub-resources.
This behavior allows a malicious site to inject a lax policy, such as unsafe-url, effectively leaking full URLs, including sensitive data, to third-party domains.
This kind of exploit bypasses conventional browser defenses and directly undermines common security assumptions in web infrastructure.
Wazuh claims it can detect and mitigate this flaw via its Wazuh Vulnerability Detection module, which uses data from its Cyber Threat Intelligence (CTI) service to monitor software versions and raise alerts when vulnerable packages are found.
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
In a lab environment set up using Wazuh OVA 4.12.0, security researchers demonstrated how endpoints running Windows 11 and Debian 11 could be scanned to identify whether they were running vulnerable versions of Chrome or Chromium.
As noted in Wazuh’s dashboard, users are instructed to add the query CVE-2025-4664 to quickly isolate impacted systems, with the module updating the vulnerability status from “Active” to “Solved” once mitigation steps are verified.
Google has issued an emergency patch to address the issue on Windows and Gentoo Linux systems. Users on these platforms are advised to update their browsers immediately.
For Chromium users on Debian 11, all versions up to 120.0.6099.224 remain vulnerable, and no updated package has yet been released. Users are encouraged to uninstall the browser until a patched version becomes available.
Despite these swift actions, the broader concern remains: how can users and enterprises reliably protect themselves against browser-based zero-day exploits?
Applying patches is essential, but relying solely on browser updates can leave significant gaps. For this reason, it is recommended to use endpoint protection platforms, along with malware protection and antivirus solutions, to stay safe.
These tools provide layered defenses that go beyond browser vulnerabilities, offering real-time detection and containment of exploit attempts.
You might also like
Google Chrome’s unique handling of referrer-policy creates a major loophole for silent data siphoning CVE-2025-4664 proves even trusted browsers are not immune to catastrophic zero-day vulnerabilities Cross-origin data is up for grabs if you haven’t updated Chrome or Chromium A newly uncovered zero-day vulnerability which affects both Windows and Linux…
Recent Posts
- These free VPNs may have ties to China’s military – and they are still hidden in Apple and Google app stores
- Kwikset’s newest smart lock gets almost everything right
- This cyberattack lets hackers crack AI models just by changing a single character
- Dbrand’s Killswitch is the best all-around Switch 2 case
- Switch 2 Pro Controller review: Nintendo’s best gamepad simply costs too much
Archives
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021
- July 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- December 2019
- November 2019
- September 2018
- October 2017
- December 2011
- August 2010