Chrome Vulnerability Fixed Researcher Earns $43K After Google Patch

0
Chrome Vulnerability Fixed – Researcher Earns $43K After Google Patch

Chrome Vulnerability Fixed Researcher Earns $43K After Google Patch

In the Chrome browser, Google fixed a serious use-after-free flaw that might have resulted in code execution.

Image shows chrome vulnerability

For disclosing a major Chrome vulnerability in the Service Worker component (recorded as CVE-2025-10200), a researcher received $43,000 from Google.

When a program accesses memory after it has been released, this is known as a use-after-free (UAF).  Crashing, corrupting data, or enabling exploits like remote code execution are all possible outcomes of this.  UAFs are frequently seen in browsers and operating systems that manage memory manually, and they are common in C/C++ programs.

On August 22, 2025, researcher Looben Yang notified Google of the vulnerability.

Image shows chrome vulnerabilityy

This problem and another bug, identified as CVE-2025-10201, were fixed in the Chrome update that Google released.  Google Chrome’s inter-process communication (IPC) framework, Mojo, has an improper implementation of CVE-2025-10201.

Researchers Sahan Fernando and an unnamed expert received $30000 from Google for bringing attention to the vulnerability CVE-2025-10201.

Version 140.0.7339.127/.128 for Windows, 140.0.7339.132/.133 for macOS, and 140.0.7339.127 for Linux are the versions of the Chrome update that are now available.

Google does not disclose if any of these flaws have been actively used in real-world assaults.

This image Show cyber security

About The Author:

Yogesh Naager is a content marketer who specializes in the cybersecurity and B2B space.  Besides writing for the News4Hackers blogs, he also writes for brands including Craw Security, Bytecode Security, and NASSCOM.

Read More:

Google Pixel 10 Supports C2PA to Confirm the Authenticity of AI-Generated Media

About Author

Leave a Reply

Your email address will not be published. Required fields are marked *

en_USEnglish