Google Addresses Actively Exploited Zero-Day Vulnerability CVE-2025-6558 in Chrome
Google has issued a critical emergency update for the Chrome browser to address CVE-2025-6558, a zero-day vulnerability that is actively being exploited in the wild. This high-severity flaw exists in Chrome’s ANGLE and GPU components, which are responsible for rendering graphics in the browser.
Summary
| OEM | |
| Severity | High |
| CVSS Score | 8.8 |
| CVEs | CVE-2025-6558 |
| POC Available | No |
| Actively Exploited | Yes |
| Exploited in Wild | Yes |
| Advisory Version | 1.0 |
Overview
Exploitation of this vulnerability could allow attackers to execute malicious code or gain unauthorized access to user systems. The update is being rolled out for Windows, macOS and Linux platforms.
| Vulnerability Name | CVE ID | Product Affected | Severity | Fixed Version |
| Improper Input Validation in ANGLE/GPU Stack vulnerability | CVE-2025-6558 | Google Chrome | High (Zero-day) | 138.0.7204.157/.158 (Windows/macOS), 138.0.7204.157 (Linux) |
Technical Summary
CVE-2025-6558 is a high-severity vulnerability caused by improper validation of untrusted input in Chrome’s ANGLE (Almost Native Graphics Layer Engine) and GPU components. These components translate graphics instructions and interact closely with the system’s native APIs.
The flaw was discovered by Google’s Threat Analysis Group (TAG) and is being actively exploited in real-world attacks. If left unpatched, it could enable attackers to compromise the browser rendering process and potentially execute arbitrary code on the user’s device.
| CVE ID | System Affected | Vulnerability Details | Impact |
| CVE-2025-6558 | Chrome on Windows, macOS, Linux | Untrusted input is incorrectly validated, allowing malicious manipulation of graphics rendering | Remote code execution through active exploitation |
Additional Vulnerabilities Patched in This Update
In addition to the zero-day CVE-2025-6558, Google also addressed two other high-severity vulnerabilities as part of this update:
- CVE-2025-7656 – An integer overflow vulnerability in Chrome’s V8 JavaScript engine, which could be exploited to corrupt memory and potentially achieve remote code execution. This flaw was reported by security researcher Shaheen Fazim.
- CVE-2025-7657 – A use-after-free vulnerability in the WebRTC (Web Real-Time Communication) component. Improper memory handling in real-time communication features could allow attackers to crash the browser or execute arbitrary code remotely. This issue was reported by researcher jakebiles.
Remediation:
- Users should immediately update Google Chrome to the latest patched version:
- Windows & Mac: 138.0.7204.157/.158
- Linux: 138.0.7204.157
Conclusion:
CVE-2025-6558 highlights the growing complexity of securing browser components such as ANGLE and GPU. With confirmed active exploitation, users and administrators must prioritize this update to prevent potential remote code execution attacks.
Timely patching remains one of the most effective defenses against modern browser-based threats.
References:


Recent Comments