Google Chrome Sandbox Escape Zero-Day (CVE-2025-6558)

A zero-day in Google Chrome’s ANGLE/GPU components (CVE‑2025‑6558) is being actively exploited to bypass browser sandboxing—visit a malicious page, and attackers may gain access to your system. Update Chrome immediately.

Google Chrome Sandbox Escape Zero-Day (CVE-2025-6558)

Overview

The CVE-2025-6558 zero-day vulnerability enables sandbox escape through improper input validation in Chrome's ANGLE and GPU subsystems– components responsible for graphics rendering. Concerningly, this flaw requires no additional user interaction beyond visiting a specially crafted webpage.

Impact

  • Remote code execution potentially reaching system-level access.
  • Vulnerable across Windows, macOS, and Linux Chrome Installations.
  • Likely leveraged by sophisticated attackers, possible nation-state actors.

Mitigation Steps

  1. Update Chrome to version 138.0.7204.157 / .158 (or later).
  2. Ensure all Chromium-based browsers (Edge, Brave, Opera, etc.) receive relevant patches.
  3. Implement network-level blocking of untrusted websites and enable sandbox hardening measures.

ThreatGrid Takeaways

  • Browser sandbox escape is exceptionally serious– patch immediately.
  • Trend underscores how rapidly zero-days are weaponized post-disclosure.
  • Threats often span multiple browser vendors– stay vigilant with updates across platforms.