Vulnerability in Chrome V8 JavaScript Engine Enables Remote Code Execution

Google has issued an emergency security update to fix a high-severity flaw in the V8 JavaScript engine used by the Chrome browser. The patch was released quickly to prevent potential remote code execution (RCE) attacks that could compromise user devices.

Discovery of the Vulnerability

The flaw, identified as CVE-2025-12036, originates from an improper implementation inside V8, the open-source engine that powers JavaScript and WebAssembly processing in Chrome.

The issue was discovered internally by Google’s AI-powered security tool, Big Sleep, on October 15, 2025. According to Google, this vulnerability could allow a malicious website to execute arbitrary code on a victim’s system simply by convincing the user to visit a compromised page.

Rapid Patch Deployment

Google acted swiftly, releasing a fix only days after discovery. The Stable Channel update brings Chrome to version 141.0.7390.122/.123 on Windows and macOS, and 141.0.7390.122 on Linux.

The company emphasized that automatic updates would roll out globally within days, protecting billions of users. Details of the bug remain private until most users receive the patch to prevent active exploitation.

Technical Details and Risks

The V8 engine executes JavaScript code efficiently, powering complex web applications such as interactive maps and online financial platforms. The CVE-2025-12036 vulnerability exploits a coding flaw that allows attackers to bypass Chrome’s sandbox protection, a critical layer that isolates running code from the system.

With successful exploitation, attackers could inject malicious scripts, read sensitive memory, or execute unauthorized commands. This could lead to data theft, malware installation, or even complete system compromise.

Security researchers note that this issue follows a pattern of recurring V8 vulnerabilities, which are frequently targeted due to the engine’s core position in web browsers.

AI-Powered Prevention

Google credited Big Sleep, its machine learning–based anomaly detection system, for identifying the flaw before it reached production. Continuous testing tools such as AddressSanitizer and libFuzzer also played a vital role in detecting memory-related bugs early in the development cycle.

Importance of Timely Updates

With Chrome commanding over 65 percent of the global browser market, any vulnerability within its ecosystem can have widespread impact. Google’s quick action demonstrates its commitment to browser security and responsible disclosure.

Experts urge users to keep automatic updates enabled, avoid visiting suspicious websites, and stay informed about ongoing security advisories.

As cyber threats continue to evolve, this incident highlights the growing importance of AI-driven security tools and automated vulnerability detection in safeguarding digital platforms.