CVE-2023-4863

8.8 HIGH CISA KEV - Actively Exploited
Published: September 12, 2023 Modified: October 24, 2025

Description

Heap buffer overflow in libwebp in Google Chrome prior to 116.0.5845.187 and libwebp 1.3.2 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/09/21/4
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/1
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/3
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/4
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/5
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/6
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/7
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/8
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/26/1
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/26/7
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/1
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/2
Source: chrome-cve-admin@google.com
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/4
Source: chrome-cve-admin@google.com
Mailing List
https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
Source: chrome-cve-admin@google.com
Third Party Advisory
https://blog.isosceles.com/the-webp-0day/
Source: chrome-cve-admin@google.com
Exploit Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1215231
Source: chrome-cve-admin@google.com
Issue Tracking Third Party Advisory
https://crbug.com/1479274
Source: chrome-cve-admin@google.com
Issue Tracking Vendor Advisory
https://en.bandisoft.com/honeyview/history/
Source: chrome-cve-admin@google.com
Release Notes
https://github.com/webmproject/libwebp/releases/tag/v1.3.2
Source: chrome-cve-admin@google.com
Release Notes
https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html
Source: chrome-cve-admin@google.com
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html
Source: chrome-cve-admin@google.com
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html
Source: chrome-cve-admin@google.com
Mailing List Third Party Advisory
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
Source: chrome-cve-admin@google.com
Patch Third Party Advisory
https://news.ycombinator.com/item?id=37478403
Source: chrome-cve-admin@google.com
Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2023-4863
Source: chrome-cve-admin@google.com
Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/202309-05
Source: chrome-cve-admin@google.com
Third Party Advisory
https://security.gentoo.org/glsa/202401-10
Source: chrome-cve-admin@google.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230929-0011/
Source: chrome-cve-admin@google.com
Third Party Advisory
https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
Source: chrome-cve-admin@google.com
Exploit Third Party Advisory
https://www.bentley.com/advisories/be-2023-0001/
Source: chrome-cve-admin@google.com
Third Party Advisory
https://www.debian.org/security/2023/dsa-5496
Source: chrome-cve-admin@google.com
Mailing List
https://www.debian.org/security/2023/dsa-5497
Source: chrome-cve-admin@google.com
Mailing List
https://www.debian.org/security/2023/dsa-5498
Source: chrome-cve-admin@google.com
Mailing List Third Party Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
Source: chrome-cve-admin@google.com
Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/09/21/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/3
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/5
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/7
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/22/8
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/26/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/26/7
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/1
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://www.openwall.com/lists/oss-security/2023/09/28/4
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://blog.isosceles.com/the-webp-0day/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1215231
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://crbug.com/1479274
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Vendor Advisory
https://en.bandisoft.com/honeyview/history/
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://github.com/webmproject/libwebp/releases/tag/v1.3.2
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes
https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
https://news.ycombinator.com/item?id=37478403
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2023-4863
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/202309-05
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/202401-10
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20230929-0011/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://sethmlarson.dev/security-developer-in-residence-weekly-report-16
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://www.bentley.com/advisories/be-2023-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2023/dsa-5496
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.debian.org/security/2023/dsa-5497
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
https://www.debian.org/security/2023/dsa-5498
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vicarius.io/vsociety/posts/zero-day-webp-vulnerability-cve-2023-4863
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-4863
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

92 reference(s) from NVD

Quick Stats

CVSS v3 Score
8.8 / 10.0
EPSS (Exploit Probability)
94.1%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2023-10-04

Weaknesses (CWE)

Affected Vendors

bandisoft mozilla debian bentley fedoraproject google microsoft netapp webmproject