CVE-2025-2783

ENISA EUVD: EUVD-2025-8225 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 20 articles Published: 2025-03-26

EPSS Score

Source: FIRST.org · 2026-05-23
47.45%
probability
This CVE has a 47.45% probability of being exploited in the next 30 days.
0% Top 97.7th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
8.3
HIGH
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

Description

VulnerabilityLookup (CNA)
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)

Affected Products

Google
Chrome
134.0.6998.177

Google Project Zero

Patched
March 25, 2025
Reported by
Boris Larin (@oct0xor) and Igor Kuznetsov (@2igosha) of Kaspersky
Root Cause Analysis
???

Exploits & PoC

Alchemist3dot14/CVE-2025-2783

Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and

32 2025-04-06
byteReaper77/CVE-2025-2783

This project is a research-oriented and educational simulation designed to demonstrate the concept of a sandbox escape vulnerability within Google C

8 2025-06-16
aronfour/CVE-2025-2783

Full-chain exploit for CVE-2025-2783 (Ipcz Sandbox Escape & RCE).

7 2026-04-01
3 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
92%
EPSS 47.45%
CVSS v3.1 8.3
Mentions 20
Last Seen Feb 12, 2026

CNA Information

CNA Assigner
Chrome

Analyst Note

CVE-2025-2783 is a high-severity sandbox escape vulnerability in Chrome's Mojo component with confirmed active exploitation in the wild, as evidenced by multiple reputable sources (BleepingComputer, TheHackerNews) reporting active attacks. The vulnerability has been patched by Google in version 134.0.6998.177, and Project Zero involvement further validates its legitimacy, warranting a CONFIRMED classification with high confidence.

Threat Actors 31

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
APT 29
apt_group Information theft and espionage 🇷🇺 RU
Cobalt
apt_group Financial crime 🇷🇺 RU
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Hacking Team
apt_group 🇮🇹 IT
NoName057
apt_group 🇷🇺 RU
SCATTERED SPIDER
apt_group Financial crime 🇺🇸 US
Tick
apt_group Information theft and espionage 🇨🇳 CN
HAZY TIGER
apt_group Information theft and espionage 🇮🇳 IN
Infy
apt_group Information theft and espionage 🇮🇷 IR
Luna Moth
apt_group
Silence group
apt_group Financial crime 🇷🇺 RU
FamousSparrow
apt_group Information theft and espionage 🇨🇳 CN
Attor
apt_group 🇷🇺 RU
Returned Libra
apt_group 🇨🇳 CN
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Operation Cobalt Whisper
apt_group Financial crime 🇨🇳 CN
Cyber Av3ngers
apt_group Sabotage and destruction 🇮🇷 IR
SOLAR SPIDER
apt_group 🇨🇳 CN
Red Dev 17
apt_group 🇨🇳 CN
Night Hunters
apt_group 🇮🇳 IN
Red October
apt_group 🇷🇺 RU
Soft Cell
apt_group Information theft and espionage 🇨🇳 CN
Pat Bear
apt_group 🇸🇾 SY
Shadow Network
apt_group Information theft and espionage 🇨🇳 CN
Mana Team
apt_group 🇨🇳 CN
Iron Group
apt_group Information theft and espionage 🇨🇳 CN
UNION SPIDER
apt_group 🇷🇺 RU
Operation Shadow Force
apt_group 🇨🇳 CN
Lurk
apt_group Financial crime 🇷🇺 RU
Hikki-chan
apt_group 🇮🇷 IR

Triage Info

Decided atMar 03, 2026
Published DateMar 26, 2025