Google Chrome Sandbox Escape Zero-Day (CVE-2025-6558)
A zero-day in Google Chrome’s ANGLE/GPU components (CVE‑2025‑6558) is being actively exploited to bypass browser sandboxing—visit a malicious page, and attackers may gain access to your system. Update Chrome immediately.

Overview
The CVE-2025-6558 zero-day vulnerability enables sandbox escape through improper input validation in Chrome's ANGLE and GPU subsystems– components responsible for graphics rendering. Concerningly, this flaw requires no additional user interaction beyond visiting a specially crafted webpage.
Impact
- Remote code execution potentially reaching system-level access.
- Vulnerable across Windows, macOS, and Linux Chrome Installations.
- Likely leveraged by sophisticated attackers, possible nation-state actors.
Mitigation Steps
- Update Chrome to version 138.0.7204.157 / .158 (or later).
- Ensure all Chromium-based browsers (Edge, Brave, Opera, etc.) receive relevant patches.
- Implement network-level blocking of untrusted websites and enable sandbox hardening measures.
ThreatGrid Takeaways
- Browser sandbox escape is exceptionally serious– patch immediately.
- Trend underscores how rapidly zero-days are weaponized post-disclosure.
- Threats often span multiple browser vendors– stay vigilant with updates across platforms.