A crucial security exposure that affects many Chrome extension users has been identified, disclosing universal uncovering of delicate Application Programming Interface keys, which are cryptographic data used for encrypting and decrypting. Secrets, that are sensitive data which includes passwords. And authentication tokens which are digital identifiers that verify a person’s identity integrated in software extension.
This serious weakness is caused by the designers embedding credentials into their JavaScript files, making this private information attainable to everyone who examines the add-on.
The weakness impacts common file extensions with many merged users, possibly revealing cloud services, data management service, and other external programs to intrusion and misuse.
The protection supervision represents one of the most basic mistakes in software engineering, where sensitive authorization factors are kept in clear text within front end code.
Once Chrome add-ons are publicized to the Web Store, their machine code becomes accessible for inspection, effectively communicating these authorizations to possible cybercriminals.
The effects reach much beyond simple data leaks, as cybercriminals can influence these authorizations to send junk mail to informational services, earning unapproved cloud computing expenses, transmit harmful data, or acquiring more access to linked services depending on the authorization related with each breached key.
Symantec investigators discovered this extensive susceptibility while supervising regular security evaluations of popular browser add-ons, discovering a structure of bad authorization management procedures across multiple high performance applications.
The finding emphasizes a widespread problem in extension creation methods, where comfort frequently replaces security concerns.
The impacted add-ons conjointly serve more than 15 million people, making this one of the biggest authorization vulnerability events in recent browser add-on history.
The susceptibility’s affect is significantly different based on the type and area of revealed authorizations, varying from distorted analytics information to possible financial losses for add-on creators whose cloud services become selected for attacks.
More unsettling is the likelihood that cybercriminals could use vulnerable AWS authorizations (usernames, passwords, or keys), or identical cloud service keys to move into expanded infrastructure, likely entering databases, data storage systems, or other linked resources if the authorizations have increased consents.
Technical Evaluation of Authorization Vulnerability Trends
The uncovered authorizations follow clear trends across different add-on classifications, with analytics keys, cloud storage authorizations, and speech recognition Application Programming Interface credential being the most general security weaknesses.
Reference-
Dutta, Tushar S., “Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens.” Cybersecuritynews.com, Cyber Security News, 6 June 2025, https://cybersecuritynews.com/chrome-extensions-vulnerability-exposes-api-keys/. Accessed 7 June 2025.