This week, Google rolled out an emergency patch for its Chrome browser on Windows systems, aimed at mitigating a serious security threat. The patch addresses a zero-day vulnerability that allows attackers to exploit a flaw in Chrome's security sandbox. This vulnerability has reportedly been used by malicious actors to target specific individuals in Russia, highlighting the urgent need for browser security enhancements.
The vulnerability, identified as CVE-2025-2783, was brought to light by Kaspersky, which discovered it while investigating a phishing campaign aimed at Russian journalists, academics, and government agencies. In this campaign, victims received fraudulent invitations to an event. Clicking on the malicious link embedded in the email triggered the exploit, allowing attackers to breach Chrome's security sandbox. This security feature is designed to isolate webpage tabs and plugins from one another, thus preventing unauthorized access and potential further exploitation.
Kaspersky researchers, Igor Kuznetsov and Boris Larin, expressed their confusion regarding the nature of the vulnerability, stating, "without doing anything obviously malicious or forbidden, it allowed the attackers to bypass Google Chrome’s sandbox protection as if it didn’t even exist." While they did not witness any subsequent malware infections firsthand, they suspect that the exploit was intended to operate alongside another vulnerability capable of enabling remote code execution.
In response to this alarming discovery, Google expressed gratitude to the Kaspersky team for their discreet notification and swiftly updated Chrome. The company explained that the vulnerability was caused by an incorrect handle provided under unspecified circumstances in Mojo, which refers to Chromium's internal inter-process communication (IPC) framework. This highlights the critical importance of continuous security assessments in software development.
Following Google's lead, Mozilla took initiative to safeguard its own browser, Firefox. On Thursday, Firefox engineers discovered a similar vulnerability within their own IPC code, prompting them to deploy a patch to address the issue. This flaw, tracked as CVE-2025-2857, also facilitated sandbox escapes on Windows, mirroring the risks posed by the Chrome vulnerability.
Mozilla explained that after the discovery of the sandbox escape in CVE-2025-2783, various Firefox developers noticed a similar pattern within their IPC framework. The organization stated that attackers could manipulate the parent process into leaking handles to unprivileged child processes, which could lead to a sandbox escape. This revelation underscores the ongoing challenges in maintaining secure browser environments amid evolving threats.
The recent vulnerabilities in both Chrome and Firefox serve as a stark reminder of the ever-present risks associated with web browsing. As cyber threats become more sophisticated, both users and developers must remain vigilant. Regular updates, user awareness, and robust security protocols are essential in protecting sensitive information and maintaining a secure online experience.