On May 14, 2025, Google rolled out a critical update to the Chrome Stable channel version 136.0.7103.113/.114 for Windows and macOS, and 136.0.7103.113 for Linux. While most users might see this as another routine browser update, cybersecurity professionals should take note: this release includes multiple security fixes, including a high-severity zero-day vulnerability (CVE-2025-4664) that has been exploited in the wild. This update is part of Google’s ongoing effort to secure its widely used web browser and shield users from increasingly sophisticated cyber threats.
This article dissects the technical specifics of the update, explains the importance of the patched vulnerabilities, particularly the exploited zero-day, and offers practical security recommendations for enterprise IT teams and end users alike.
The Importance of Chrome Version 136.0.7103.113/.114
This release marks an important security milestone as it addresses four critical vulnerabilities, two of which were disclosed by external security researchers. One of these CVE-2025-4664 has already been weaponized in the wild, raising urgency for immediate patch deployment across all endpoints.
Slonser noted in his X account:
A fix from Google was released today. Part of the issue was due to my misunderstanding based on previous reports. Big thanks to chromium team for the quick resolve I hope everyone had some fun, and apologies to the triagers on HackerOne XD
He also added:
Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

Overview of Key Fixes
- CVE-2025-4664 – High severity – Insufficient policy enforcement in Loader
- Reported by: @slonser_ via X on May 5, 2025
- Impact: This vulnerability could allow malicious actors to bypass security policies enforced during resource loading, potentially enabling unauthorized code execution.
- Status: Exploited in the wild. Google is restricting full technical details until a majority of users are updated.
- CVE-2025-4609 – High severity – Incorrect handle in Mojo
- Reported by: Security researcher Micky on April 22, 2025
- Impact: Mismanagement of system handles in the Mojo IPC framework could lead to crashes or privilege escalation under certain conditions.
- Status: No evidence of active exploitation at time of release.
- Internal Fixes and Fuzzing Discoveries:
- Google’s internal team has contributed numerous fixes discovered via advanced fuzzing tools and static analysis frameworks like AddressSanitizer, libFuzzer, and Control Flow Integrity modules.
Why CVE-2025-4664 Matters
Zero-day vulnerabilities those actively exploited before a patch is available pose immediate danger. CVE-2025-4664’s exploitation confirms that attackers are already leveraging this flaw in the wild. Although the technical details remain confidential to prevent further abuse, the vulnerability’s classification points to a severe flaw in Chrome’s internal resource loading mechanisms.
Historically, browser-based zero-days have been employed in:
- Drive-by-download attacks via compromised websites
- Phishing campaigns using malicious JavaScript payloads
- Surveillance campaigns against high-value targets
Security professionals and administrators are urged to ensure their systems are updated immediately.
Broader Security Context
With Chrome being the most widely used browser globally—with more than 3.2 billion users across platforms—it remains a high-value target for cybercriminals. This reality drives Google’s continuous focus on browser hardening, employing techniques such as:
- Bug bounty programs
- Fuzz testing automation
- Sandboxing of browser processes
- Memory safety tools
The update aligns with Google’s best-in-class vulnerability response approach: patch fast, communicate responsibly, and reward researchers contributing to platform security.
Enterprise Implications
Organizations that delay browser updates expose themselves to significant risk, especially if employees use Chrome for email, document handling, or web-based internal tools. A single unpatched vulnerability could act as an entry point for advanced persistent threats (APTs), ransomware, or data exfiltration.
10 Tips to Avoid Security Risks from Browser Vulnerabilities
- Enable Automatic Updates: Ensure Chrome is configured to auto-update on all workstations.
- Centralize Patch Management: Use enterprise tools like Google Chrome Enterprise or GPOs to enforce update policies.
- Monitor CVE Feeds: Keep track of CVE announcements via NVD, MITRE, and vendors like Google.
- Deploy Application Sandboxing: Isolate browser activity using virtualization or containerization when dealing with untrusted sources.
- Implement Zero Trust Web Access: Limit what websites employees can access based on roles and risk.
- Train Staff on Phishing and Drive-by Threats: Human error remains the top vector for exploitation.
- Utilize Endpoint Detection and Response (EDR): Spot unusual Chrome behavior at the process level.
- Leverage Browser Security Extensions: Use vetted extensions for script-blocking, privacy enforcement, etc.
- Audit Permissions for Plugins and Extensions: Reduce the attack surface by removing unused or unnecessary tools.
- Engage in Bug Bounty Collaboration: Large organizations can consider their own incentivized testing programs.
Conclusion
The release of Chrome 136.0.7103.113/.114 is more than just another version increment it is a critical response to active cyber threats targeting everyday users and enterprises alike. With CVE-2025-4664 already exploited in the wild, the urgency to patch cannot be overstated. Organizations must remain vigilant, prioritize browser security updates, and adopt a layered security model that includes proactive monitoring, secure configuration, and continuous training.
For security teams, now is the time to assess browser hygiene across the enterprise and take immediate action. The speed of today’s cyber attackers leaves no room for delay.
Stay safe, stay updated.
Sources:
- Google Chrome Releases Blog: https://chromereleases.googleblog.com
- NVD NIST CVE-2025-4664 Listing
- CVE Reports by external researchers
- Internal Chrome security audit documentation
If you’d like a printable security bulletin version of this article for your IT team or clients, let me know!