CVE-2023-4863
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
| Vendor | |
| Product | chrome |
| Ecosystems | |
| Industries | Technology |
| Published | Sep 12, 2023 |
| Last Updated | Oct 21, 2025 |
โ ๏ธ Actively Exploited โ Act Now
Get instant alerts for google chrome
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2023-4863.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Google / Chrome
116.0.5845.187 < 116.0.5845.187
Google / libwebp
1.3.2 < 1.3.2
References
chromereleases.googleblog.com: https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html crbug.com: https://crbug.com/1479274 en.bandisoft.com: https://en.bandisoft.com/honeyview/history/ stackdiary.com: https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/ mozilla.org: https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/ github.com: https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a msrc.microsoft.com: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863 security-tracker.debian.org: https://security-tracker.debian.org/tracker/CVE-2023-4863 bugzilla.suse.com: https://bugzilla.suse.com/show_bug.cgi?id=1215231 news.ycombinator.com: https://news.ycombinator.com/item?id=37478403 bleepingcomputer.com: https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/ debian.org: https://www.debian.org/security/2023/dsa-5496 debian.org: https://www.debian.org/security/2023/dsa-5497 lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/ debian.org: https://www.debian.org/security/2023/dsa-5498 security.gentoo.org: https://security.gentoo.org/glsa/202309-05 lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ adamcaudill.com: https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/ github.com: https://github.com/webmproject/libwebp/releases/tag/v1.3.2 lists.debian.org: https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ openwall.com: http://www.openwall.com/lists/oss-security/2023/09/21/4 blog.isosceles.com: https://blog.isosceles.com/the-webp-0day/ openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/1 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/3 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/4 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/5 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/8 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/7 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/22/6 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/26/1 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/26/7 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/28/1 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/28/2 openwall.com: http://www.openwall.com/lists/oss-security/2023/09/28/4 security.netapp.com: https://security.netapp.com/advisory/ntap-20230929-0011/ lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/ sethmlarson.dev: https://sethmlarson.dev/security-developer-in-residence-weekly-report-16 bentley.com: https://www.bentley.com/advisories/be-2023-0001/ security.gentoo.org: https://security.gentoo.org/glsa/202401-10 vicarius.io: https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4863