Cookie Encryption Bypass in Google Chrome Affecting AppBound Mechanism
CVE-2025-34092

9.3CRITICAL

Key Information:

Vendor

Google

Status
Vendor
CVE Published:
2 July 2025

What is CVE-2025-34092?

A cookie encryption bypass vulnerability exists within Google Chrome's AppBound mechanism, stemming from inadequate path validation logic in the elevation service. When a cookie key is encrypted, Chrome stores its executable path as metadata for validation. During decryption, this path is checked against the incoming process's path. An attacker can exploit inconsistencies in path canonicalization by creating a malicious executable named 'chrome.exe' in a similar directory, potentially allowing unauthorized access to encrypted cookies intended specifically for the Chrome process. Other Chromium-based browsers may also be susceptible if they employ similar encryption methods.

Affected Version(s)

Chrome 127 < 129

References

CVSS V4

Score:
9.3
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ari Novick of CyberArk Labs
.
CVE-2025-34092 : Cookie Encryption Bypass in Google Chrome Affecting AppBound Mechanism