On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-4664

Insufficient Policy Enforcement in Google Chrome’s Loader: CVE-2025-4664 Decoded

Vulnerability Overview

CVE ID: CVE-2025-4664

CVE Title: Insufficient Policy Enforcement in Google Chrome Loader — Cross-Origin Data Leak

Severity: Medium

Exploit Status: Public proof-of-concepts available

Business Risk: Leaked session or OAuth tokens in URLs can let attackers take over accounts and expose private sessions.

Summary

A flaw in Chrome’s Loader lets a crafted web page cause the browser to disclose cross-origin data it should keep private. By abusing how Chrome handles Link headers and referrer-policy for sub-resource requests, an attacker can capture full referrer URLs (including sensitive query parameters such as OAuth tokens) and send them to an attacker-controlled server.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-4664?

Technical Overview

How Does the CVE-2025-4664 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-4664 Exploit Work?

What Causes CVE-2025-4664?

Vulnerability Root Cause:

The flaw is in Chrome’s Loader component failing to enforce referrer and origin policies correctly for subresource requests. Chrome processes the HTTP Link header on those requests and accepts a referrer-policy set there. A crafted Link header can force Chrome to send full referrer URLs (including query strings like OAuth tokens) to thirdparty sites, allowing attackers to capture sensitive data.

How Can You Mitigate CVE-2025-4664?

If immediate patching is delayed or not possible:

  • Remove or block the vulnerable Chrome/Chromium builds from use.
  • If a fixed build isn’t available on a platform, discontinue use of that browser until a patched release is installed.
  • Use your vulnerability detection tooling to find all affected hosts and track remediation status.
  • Monitor outbound browser traffic for unexpected requests that include full referrer URLs or query parameters sent to unfamiliar third-party domains.
  • Verify remediation by checking browser versions (for example via chrome://settings/help) and confirming inventory/patch reports show the patched builds.
  • Follow CISA’s guidance (KEV listing and BOD 22-01 recommendations) and Google’s update instructions as you apply mitigations.
  • Advise users to avoid visiting untrusted or suspicious websites while systems remain unpatched.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-4664 Cause Downtime?

Patch application impact: Low. Updating to Chrome versions 136.0.7103.113 (Windows/Linux) or 136.0.7103.114 (macOS) resolves the issue. The update installs automatically or with minimal user action and causes no downtime or service disruption.

How Can You Detect CVE-2025-4664 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Remediation Timeline:

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:

Audit Trail Requirement:

Policy Alignment:

CVSS Breakdown Table

MetricValue Description
Base Score4.3Medium severity vulnerability indicating potential data exposure through cross-origin leaks
Attack VectorNetworkExploitable remotely via a crafted HTML page without local access
Attack ComplexityLowExploitation is straightforward; no special conditions required
Privileges RequiredNoneNo authentication or elevated privileges needed
User Interaction RequiredUser must visit a malicious webpage for the exploit to trigger
Scope UnChanged Exploitation affects only the Chrome Loader component
Confidentiality Impact LowAttack can leak cross-origin data such as OAuth tokens
Integrity ImpactNoneExploit does not allow modification of data
Availability ImpactNoneNo impact on system availability; browser continues functioning normally

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.