CVE-2025-2783
ENISA EUVD: EUVD-2025-8225 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
20 articles
Published: 2025-03-26
EPSS Score
Source: FIRST.org · 2026-05-23
47.45%
probability
This CVE has a 47.45% probability
of being exploited in the next 30 days.
0%
Top 97.7th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)8.3
HIGH
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 134.0.6998.177 allowed a remote attacker to perform a sandbox escape via a malicious file. (Chromium security severity: High)
Affected Products
Google
Chrome
134.0.6998.177
Google Project Zero
Patched
March 25, 2025
Reported by
Boris Larin (@oct0xor) and Igor Kuznetsov (@2igosha) of Kaspersky
Root Cause Analysis
???
Exploits & PoC
Alchemist3dot14/CVE-2025-2783
Simulated PoC for CVE-2025-2783 — a sandbox escape vulnerability in Chrome's Mojo IPC. Includes phishing delivery, memory fuzzing, IPC simulation, and
32
2025-04-06
byteReaper77/CVE-2025-2783
This project is a research-oriented and educational simulation designed to demonstrate the concept of a sandbox escape vulnerability within Google C
8
2025-06-16
aronfour/CVE-2025-2783
Full-chain exploit for CVE-2025-2783 (Ipcz Sandbox Escape & RCE).
7
2026-04-01
3 repos — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
92%
EPSS
47.45%
CVSS v3.1
8.3
Mentions
20
Last Seen
Feb 12, 2026
CNA Information
CNA Assigner
Chrome
Analyst Note
CVE-2025-2783 is a high-severity sandbox escape vulnerability in Chrome's Mojo component with confirmed active exploitation in the wild, as evidenced by multiple reputable sources (BleepingComputer, TheHackerNews) reporting active attacks. The vulnerability has been patched by Google in version 134.0.6998.177, and Project Zero involvement further validates its legitimacy, warranting a CONFIRMED classification with high confidence.
Threat Actors 31
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
APT 29
apt_group
Information theft and espionage
🇷🇺 RU
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Hacking Team
apt_group
🇮🇹 IT
NoName057
apt_group
🇷🇺 RU
SCATTERED SPIDER
apt_group
Financial crime
🇺🇸 US
Tick
apt_group
Information theft and espionage
🇨🇳 CN
HAZY TIGER
apt_group
Information theft and espionage
🇮🇳 IN
Infy
apt_group
Information theft and espionage
🇮🇷 IR
Luna Moth
apt_group
Silence group
apt_group
Financial crime
🇷🇺 RU
FamousSparrow
apt_group
Information theft and espionage
🇨🇳 CN
Attor
apt_group
🇷🇺 RU
Returned Libra
apt_group
🇨🇳 CN
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Operation Cobalt Whisper
apt_group
Financial crime
🇨🇳 CN
Cyber Av3ngers
apt_group
Sabotage and destruction
🇮🇷 IR
SOLAR SPIDER
apt_group
🇨🇳 CN
Red Dev 17
apt_group
🇨🇳 CN
Night Hunters
apt_group
🇮🇳 IN
Red October
apt_group
🇷🇺 RU
Soft Cell
apt_group
Information theft and espionage
🇨🇳 CN
Pat Bear
apt_group
🇸🇾 SY
Shadow Network
apt_group
Information theft and espionage
🇨🇳 CN
Mana Team
apt_group
🇨🇳 CN
Iron Group
apt_group
Information theft and espionage
🇨🇳 CN
UNION SPIDER
apt_group
🇷🇺 RU
Operation Shadow Force
apt_group
🇨🇳 CN
Lurk
apt_group
Financial crime
🇷🇺 RU
Hikki-chan
apt_group
🇮🇷 IR
Triage Info
Decided atMar 03, 2026
Published DateMar 26, 2025