Palo Alto Networks Security Advisories / PAN-SA-2025-0018

PAN-SA-2025-0018 Chromium and Prisma Browser: Monthly Vulnerability Update (November 2025)

Urgency MODERATE

047910
Severity 6.1 · MEDIUM
Exploit Maturity UNREPORTED
Response Effort MODERATE
Recovery USER
Value Density DIFFUSE
Attack Vector NETWORK
Attack Complexity LOW
Attack Requirements NONE
Automatable NO
User Interaction ACTIVE
Product Confidentiality HIGH
Product Integrity HIGH
Product Availability HIGH
Privileges Required NONE
Subsequent Confidentiality NONE
Subsequent Integrity NONE
Subsequent Availability NONE

Description

Palo Alto Networks incorporated the following Chromium security fixes into our products:

CVECVSSSummary
CVE-2025-12428Type Confusion in V8
CVE-2025-12429Inappropriate implementation in V8
CVE-2025-12430Object lifecycle issue in Media
CVE-2025-12431Inappropriate implementation in Extensions
CVE-2025-12432Race in V8
CVE-2025-12433Inappropriate implementation in V8
CVE-2025-12036Inappropriate implementation in V8
CVE-2025-12434Race in Storage
CVE-2025-12435Incorrect security UI in Omnibox
CVE-2025-12436Policy bypass in Extensions
CVE-2025-12437Use after free in PageInfo
CVE-2025-12438Use after free in Ozone
CVE-2025-12439Inappropriate implementation in App-Bound Encryption
CVE-2025-12440Inappropriate implementation in Autofill
CVE-2025-12441Out of bounds read in V8
CVE-2025-12443Out of bounds read in WebXR
CVE-2025-12444Incorrect security UI in Fullscreen UI
CVE-2025-12445Policy bypass in Extensions
CVE-2025-12446Incorrect security UI in SplitView
CVE-2025-12447Incorrect security UI in Omnibox
CVE-2025-4616Prisma Browser: Insufficient Validation of Untrusted Input Vulnerability in Prisma Browser
CVE-2025-4617Prisma Browser: Insufficient Policy Enforcement Vulnerability in Prisma Browser
CVE-2025-4618Prisma Browser: Sensitive Information Disclosure Vulnerability in Prisma Browser

Product Status

VersionsAffectedUnaffected
Prisma Browser < 142.15.2.60>= 142.15.6.60

Severity: MEDIUM, Suggested Urgency: MODERATE

CVSS-BT: 6.1 / CVSS-B: 8.6 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/AU:N/R:U/V:D/RE:M/U:Amber)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Solution

CVEPrisma Browser
CVE-2025-12428
142.15.2.60
CVE-2025-12429
142.15.2.60
CVE-2025-12430
142.15.2.60
CVE-2025-12431142.15.2.60
CVE-2025-12432142.15.2.60
CVE-2025-12433142.15.2.60
CVE-2025-12430
142.15.2.60
CVE-2025-12434
142.15.2.60
CVE-2025-12435142.15.2.60
CVE-2025-12436142.15.2.60
CVE-2025-12437142.15.2.60
CVE-2025-12438142.15.2.60
CVE-2025-12439142.15.2.60
CVE-2025-12440142.15.2.60
CVE-2025-12441142.15.2.60
CVE-2025-12443142.15.2.60
CVE-2025-12444142.15.2.60
CVE-2025-12445142.15.2.60
CVE-2025-12446142.15.2.60
CVE-2025-12447142.15.2.60
CVE-2025-4616
142.15.6.60
CVE-2025-4617142.15.6.60
CVE-2025-4618142.15.6.60

Workarounds and Mitigations

No known workarounds exist for this issue.

Acknowledgments

Palo Alto Networks thanks Tan Inn Fung, Yu Ann Ong, Zhang Bosen from the GovTech Cybersecurity Group for discovering and reporting CVE-2025-4616, CVE-2025-4617 and CVE-2025-4618.

CPE Applicability

Timeline

Initial Publication
© 2025 Palo Alto Networks, Inc. All rights reserved.