Google Chrome logo on smartphone in hand.

Relaunch Google Chrome now.

SOPA Images/LightRocket via Getty Images

Hot on the heels of not just one, but two emergency security updates for the Chrome browser within the space of a single week, details of how attackers targeted the Chrome security sandbox with a zero-day exploit, comes the confirmation of yet another update. This time, Google has disclosed that there are no less than 20 vulnerabilities impacting the Chrome browser. Here’s why you must act now —and how —to ensure your browser is secure.

ForbesGmail Passwords Confirmed Within 183 Million Account Infostealer LeakBy Davey WinderWhat You Need To Know About The Google Chrome 142 Security Update

Srinivas Sista, part of the Google Chrome team, has confirmed that Chrome 142 is now being rolled out to three billion users to fix a whole swathe of security issues, including seven high-rated vulnerabilities. In total, 20 vulnerabilities are covered and fixed by this important security update for all Chrome users, other than, as always, those on the iOS platform.

The security updates will become available to Windows, Mac and Linux users across the coming days. The version numbers to look out for are: 142.0.7444.59/60 on Windows, 142.0.7444.60 on macOS, and 142.0.7444.59 for Linux users. While updates are automated, it is highly recommended that you kickstart the process even if your browser isn’t yet showing the restart to update flag. You can do this by heading for the settings menu and selecting About Google Chrome. It is vital to note that you must relaunch your Chrome browser, following the instructions given, because otherwise the update will not be applied and won’t activate the security patch.

And that would mean you will not be protected against the potential attacks that could exploit the vulnerabilities as listed below.

High-rated

CVE-2025-12428
Type Confusion in V8CVE-2025-12429
Inappropriate implementation in V8CVE-2025-12430
Object lifecycle issue in MediaCVE-2025-12431
Inappropriate implementation in ExtensionsCVE-2025-12432
Race in V8CVE-2025-12433
Inappropriate implementation in V8CVE-2025-12036
Inappropriate implementation in V8

Medium-rated

CVE-2025-12434
Race in StorageCVE-2025-12435
Incorrect security UI in OmniboxCVE-2025-12436
Policy bypass in ExtensionsCVE-2025-12437
Use after free in PageInfo.CVE-2025-12438
Use after free in OzoneCVE-2025-12439
Inappropriate implementation in App-Bound EncryptionCVE-2025-12441
Out of bounds read in V8CVE-2025-12443
Out of bounds read in WebXR

Low-rated

CVE-2025-12440
Inappropriate implementation in AutofillCVE-2025-12444
Incorrect security UI in Fullscreen UICVE-2025-12445
Policy bypass in ExtensionsCVE-2025-12446
Incorrect security UI in SplitViewCVE-2025-12447
Incorrect security UI in Omnibox

You know what to do. Check Google Chrome now and ensure you have the latest updates installed and activated.

ForbesUpdate Now As Microsoft Confirms New Windows Admin ProtectionBy Davey Winder