Malicious Code Compromise in Web Developer Chrome Extension by Chris Pederick
CVE-2017-20202

9.3CRITICAL

Key Information:

Vendor
CVE Published:
8 October 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2017-20202?

A compromise in the Web Developer for Chrome extension v0.4.9 enabled the execution of malicious code through a domain generated via a Domain Generation Algorithm (DGA). This malicious code fetched remote scripts that could load additional modules for ad substitution and malvertising. Victims experienced fake repair alerts redirecting them to affiliate programs, and there were attempts to harvest user credentials during login. The injected components were designed to enumerate common banner sizes for substitution purposes, replace legitimate third-party ad calls, and hijack user traffic towards affiliate landing pages. This incident raised significant concerns regarding user-level code execution in the browser context, extensive ad fraud, traffic redirection, and potential exposure to further malicious payloads.

Affected Version(s)

Web Developer for Chrome 0.4.9

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2017-20202 : Malicious Code Compromise in Web Developer Chrome Extension by Chris Pederick