The Chromium-assigned vulnerability CVE-2025-11460 — a use-after-free in the Storage component — appears in Microsoft’s Security Update Guide because Microsoft Edge (Chromium-based) consumes Chromium’s open-source engine; the Security Update Guide entry is Microsoft’s downstream signal that Edge has ingested the upstream Chromium fix and that a particular Edge build is no longer vulnerable.
Chromium is a shared open‑source engine that powers many browsers, most notably Google Chrome and Microsoft Edge (Chromium-based). When a security flaw is discovered in Chromium the upstream project assigns a CVE and ships a Chromium/Chrome patch; downstream vendors such as Microsoft then ingest that upstream change, run internal testing, and ship the corresponding fix in a vendor‑specific build of Edge. Microsoft documents Chromium‑assigned CVEs in the Security Update Guide (SUG) so enterprise and consumer customers know whether Microsoft’s Edge builds still contain the vulnerable upstream code. This is the intended operational model: upstream discovery → upstream patch → downstream ingestion/testing → downstream ship → Security Update Guide signals remediation.
That workflow explains two things many readers find confusing:
Source: MSRC Security Update Guide - Microsoft Security Response Center
Background / Overview
Chromium is a shared open‑source engine that powers many browsers, most notably Google Chrome and Microsoft Edge (Chromium-based). When a security flaw is discovered in Chromium the upstream project assigns a CVE and ships a Chromium/Chrome patch; downstream vendors such as Microsoft then ingest that upstream change, run internal testing, and ship the corresponding fix in a vendor‑specific build of Edge. Microsoft documents Chromium‑assigned CVEs in the Security Update Guide (SUG) so enterprise and consumer customers know whether Microsoft’s Edge builds still contain the vulnerable upstream code. This is the intended operational model: upstream discovery → upstream patch → downstream ingestion/testing → downstream ship → Security Update Guide signals remediation. That workflow explains two things many readers find confusing:
- A CVE that originates in Chromium is not only “Google’s problem” — it affects any product that consumes the same vulnerable code.
- The presence of a Chromium CVE in Microsoft’s SUG does not mean Microsoft authored the vulnerability; it means Microsoft is tracking the upstream issue and telling you when Edge is patched.
Why CVE-2025-11460 shows up in the Security Update Guide
The ingestion model and operational transparency
Microsoft lists Chromium CVEs in the Security Update Guide for a practical reason: Edge uses Chromium code, so Microsoft must tell its customers when Edge is patched. The SUG entry serves two operational purposes:- Visibility: It records that the upstream CVE exists and identifies Microsoft products that consume the affected code.
- Exact remediation signal: It indicates when Microsoft’s own Edge build has ingested the Chromium fix and been shipped to customers.
Why vendors don’t simply rely on Chrome’s advisory
Vendors do not automatically inherit the upstream patch the instant Google ships it. Microsoft tests and integrates upstream changes on a controlled cadence to avoid regressions in enterprise environments. That delay — usually measured in days to a few weeks depending on the severity and complexity of the patch — creates a short window where Chrome may be patched but Edge is not yet updated. Listing Chromium CVEs in SUG closes this visibility gap and prevents assumptions that “Chrome is patched therefore Edge is safe.”How to check your browser version (quick, authoritative methods)
To confirm whether your installation is patched you must:- Get the local browser version string.
- Compare that string with the patched version published in either the Chrome release notes (upstream) or Microsoft’s Edge release notes / Security Update Guide entry (downstream).
Microsoft Edge (desktop — Windows / macOS)
- GUI method (recommended for most users):
- Open Microsoft Edge.
- Click the three dots menu (Settings and more) in the top‑right.
- Choose Help and feedback → About Microsoft Edge.
- The page shows the Edge version and will automatically check for updates; if an update is available choose Download and install.
- Address‑bar shortcuts (technical / fast):
- Type edge://settings/help into the address bar and press Enter to open About.
- Type edge://version to see the version and underlying Chromium revision without triggering an update check.
- Type edge://system to view system and build details including the Chromium backend.
- Mobile (Android / iOS):
- Open Edge → Menu → Settings → About or check the app’s page in Google Play / App Store to see the version.
Google Chrome (desktop — Windows / macOS / Linux)
- GUI method:
- Open Chrome.
- Click the three dots menu → Help → About Google Chrome.
- Chrome displays the version and checks for updates. Or type chrome://settings/help.
- Address‑bar shortcut:
- Type chrome://version to display the full version and build details.
Practical notes on the version string
- The full version string looks like: 141.0.7390.65 (major.minor.build.patch).
- Edge’s version numbering ties to an Edge-specific build; some Edge releases annotate “incorporates the latest Security Updates of the Chromium project” in Microsoft’s release notes — use that notation as your confirmation of ingestion.
How to use the version to confirm that CVE-2025-11460 is fixed
- Find the upstream patch: check Google’s Chrome Releases notes for the Chrome build that fixed CVE-2025-11460 (Chromium/Chrome release posts list CVE IDs and fixed builds when disclosure is appropriate). For recent Chromium security updates this is the canonical upstream source.
- Find Microsoft’s downstream confirmation: check the Microsoft Security Update Guide and the Edge release notes to see which Edge build “incorporates the latest Security Updates of the Chromium project” and whether the SUG entry for CVE‑2025‑11460 shows the vulnerability as addressed for Edge. Microsoft uses SUG to explicitly document that status.
- Compare versions:
- If your installed Edge version is the same as (or newer than) the Edge build that Microsoft indicates contains the ingestion, your Edge installation is no longer vulnerable.
- If your Edge version is older than that target, update Edge (via the About page or your enterprise patching system) and verify again.
- An upstream Chrome stable update pushed the 141.0.7390.65/.66 builds; security trackers listed vulnerable Chromium builds up to 141.0.7390.64. If Chrome’s fixed build is 141.0.7390.65 and Microsoft’s Edge release notes show Edge has ingested Chromium 141.x at a particular Edge build number, you must be on that Edge build or later to be protected. (Treat the exact numbers as time‑sensitive — always verify the current fixed build in Chrome Releases and the Edge release notes/SUG for the CVE in question.)
Step‑by‑step: Verify on your device (concise checklist)
- Open Microsoft Edge.
- Go to Settings and more → Help and feedback → About Microsoft Edge (or edge://settings/help).
- Note the full version string (copy it).
- Open the Security Update Guide entry for CVE‑2025‑11460 (or check Microsoft’s Edge security release notes) and find the Edge build where Microsoft states the CVE is mitigated.
- If your Edge version is older, allow the About page to update (or update via your management tools). If on a managed device, consult your IT team to schedule the required Edge update.
Enterprise and admin guidance
- Inventory first: use your endpoint management system (Intune, SCCM/MECM, Jamf, etc.) to inventory Edge and Chrome versions across the fleet. Export results and prioritize endpoints running older versions in public‑facing roles or with privileged users.
- Confirm ingestion: for Edge, do not assume parity with Chrome. Verify Microsoft’s SUG / Edge release notes show the ingestion of the Chromium fix for CVE‑2025‑11460. The SUG entry is the downstream authoritative confirmation.
- Staged rollout with urgency: if Microsoft’s patched Edge build is available, accelerate deployment for high‑risk groups (admins, remote access workstations, kiosks). Use a pilot ring to catch compatibility regressions, then push broader rollout.
- Embedded Chromium: inventory any Electron apps, kiosks, or custom packages that embed a Chromium runtime; these do not auto‑update with Edge/Chrome and are commonly overlooked. Plan separate remediation for those packages.
- Compensations while waiting: use web filtering, restrict high‑risk browsing on privileged endpoints, enforce Enhanced Security Mode/site isolation, and ensure EDR rules monitor renderer crashes and unusual child processes coming from browser binaries.
Threat and risk analysis — what this vulnerability class means
A use‑after‑free (CWE‑416) in a storage-related component can be leveraged in multiple ways depending on the exact code path and available exploitation primitives. Potential consequences include:- Information disclosure (if storage items can be read cross-origin),
- memory corruption leading to crashes, and
- in the worst case, remote code execution if an attacker can chain the corruption into control‑flow manipulation and escape the renderer sandbox.
Strengths and limitations of Microsoft’s SUG approach
Strengths:- Authoritative downstream confirmation: Enterprises can rely on SUG to confirm Edge’s patched status for Chromium CVEs.
- Single pane of glass: SUG centralizes vulnerability state for Microsoft products, aiding compliance and audit workflows.
- Ingestion lag: There is always a short window between upstream Chrome fixes and downstream Edge releases; that gap is the operational risk window. Treat this as a planning factor, not a failure.
- Embedded Chromium blind spot: Applications bundling Chromium (Electron, kiosks) may remain vulnerable even after browser updates; these require separate tracking.
- Terse advisories: Browser vendors frequently limit technical details during rollout to reduce immediate weaponization; defenders must act on the CVE presence even when low‑level specifics are withheld.
Practical recommendations (what to do now)
- Home users:
- Open Edge → About Microsoft Edge (edge://settings/help) and update if needed. If Chrome is your primary browser, open Chrome → About Google Chrome and update. These steps often auto‑trigger the update download.
- Small business / IT:
- Inventory Edge/Chrome versions.
- If Edge is the corporate standard, check Microsoft’s SUG entry for CVE‑2025‑11460 and match your Edge version to the patched build.
- Patch high‑risk endpoints first; if Edge ingestion is delayed, update Chrome where feasible and apply compensating controls on Edge endpoints until Microsoft ships the patched build.
- Enterprise security teams:
- Use management tooling to produce a version map, accelerate deployment to pilot/production rings, and hunt for any unusual renderer crash telemetry indicative of attempted exploitation. Consider temporary isolation for high‑privilege users.
What remains unverifiable / cautionary notes
- If you require exact proof of exploitation in the wild for CVE‑2025‑11460 (forensics or an incident report), that status can change rapidly and should be verified with threat‑intelligence feeds and vendor advisories dated the day you check. Public trackers and vendor pages are the authoritative references for exploit status; absence of a public PoC at the time of disclosure does not mean a PoC will not appear later. Treat exploitability statements as time‑sensitive.
- When SUG pages are dynamic or interactive, retrieval via automated tools may be inconsistent; if you cannot load the SUG entry due to network or UI constraints, verify Edge’s ingestion state by checking Microsoft’s Edge release notes for the same CVE ID as a secondary confirmation.
Closing summary
- CVE‑2025‑11460 — a Chromium use‑after‑free in Storage — is listed in Microsoft’s Security Update Guide because Edge consumes the Chromium engine; Microsoft logs the upstream CVE and uses SUG to announce when an Edge build has ingested the fix and is no longer vulnerable.
- To confirm whether your browser is protected:
- Get the local version from About (edge://settings/help or chrome://settings/help) or chrome://version / edge://version.
- Compare that version to the upstream Chrome fixed build (Chrome Releases) and the Edge ingestion/patched build shown in Microsoft’s SUG or Edge release notes.
- Immediate action: check About → update and relaunch. For admins: inventory, verify ingestion in SUG, and accelerate deployment for high‑risk endpoints.
Source: MSRC Security Update Guide - Microsoft Security Response Center