ID:11766 - Exploit for Permissions, Privileges, and Access Controls in Google Chromium - CVE-2025-4664
Published: July 3, 2025
Google Chromium
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient policy enforcement in Loader. A remote attacker can trick the victim into visiting a specially crafted website and bypass implemented security restrictions.
Note, the vulnerability is being actively exploited in the wild.