Cybersecurity Researcher Earns $250,000 for Chrome Sandbox Escape Vulnerability

Cybersecurity Researcher Earns $250,000 for Chrome Sandbox Escape Vulnerability

A security researcher known by the alias Micky has received a record-breaking $250,000 bounty from Google for discovering a critical Chrome vulnerability that allowed attackers to bypass the browser’s sandbox.

The flaw, tracked as CVE-2025-4609, was first identified in April 2025 and patched in mid-May with the release of Chrome 136, along with updates to other Chromium-based browsers such as Microsoft Edge, Opera, Vivaldi, and Brave. Google has now disclosed the technical details.


Technical Breakdown

The vulnerability was located in Chrome’s Mojo ipcz library, which manages inter-process communication (IPC) within the browser.

Google classified the bug as high severity, describing it as a “very complex logic bug.” Micky’s report stood out for its high-quality analysis and inclusion of a working proof-of-concept (PoC) exploit that successfully demonstrated a sandbox escape.

According to the researcher, the PoC achieved a 70–80% success rate in bypassing Chrome’s sandbox and executing system commands—demonstrated by launching the Windows Calculator application. In practical terms, the exploit allowed manipulation of Chrome’s internal processes, duplication of the browser’s parent process, and execution of arbitrary code.

In a real-world attack scenario, exploitation would typically require the victim to visit a malicious website while running a vulnerable version of Chrome.


Bug Bounty Record

The $250,000 payout is the maximum reward offered under Google’s Chrome Vulnerability Reward Program for sandbox escape vulnerabilities—reserved for high-quality reports with a working remote code execution demonstration.

This is one of the largest payouts in Google’s bug bounty history, second only to the $605,000 awarded in 2022 to a researcher known as gzobqq for discovering five Android vulnerabilities.

Read more