Vulnerability

Firefox Issues Security Update To Patch Multiple Critical Vulnerabilities Enabling Code Execution

Mozilla has released Firefox 145 on November 11, 2025, along with updates for Extended Support Release versions ESR 140.5 and ESR 115.30, to address 16 security vulnerabilities, several of which are rated high-impact and could enable remote code execution without user interaction beyond normal browsing.

These flaws, detailed in Mozilla Foundation Security Advisory (MFSA) 2025-87, primarily affect the browser’s graphics processing, JavaScript engine, and DOM components, posing risks of arbitrary code execution and sandbox escapes that could compromise user systems.

The update also patches similar issues in Thunderbird 145, emphasizing the urgency for users across personal and enterprise environments to apply the fixes promptly.​

Key Vulnerabilities Addressed

Among the patched issues, CVE-2025-13027 stands out as a cluster of memory safety bugs discovered by Mozilla’s Fuzzing Team in Firefox 144 and Thunderbird 144, showing evidence of memory corruption that could be exploited for arbitrary code execution with sufficient attacker effort.

High-severity flaws like CVE-2025-13023 and CVE-2025-13026 involve sandbox escapes in the Graphics and WebGPU components, allowing malicious code to escape Firefox’s isolation mechanisms and access underlying system resources during web content rendering.

Additional critical vulnerabilities include use-after-free errors in the Audio/Video (CVE-2025-13020) and WebRTC components (CVE-2025-13014), as well as race conditions in Graphics (CVE-2025-13012) and incorrect boundary conditions in JavaScript WebAssembly (CVE-2025-13021, CVE-2025-13022, CVE-2025-13025), all potentially leading to out-of-bounds reads, writes, or crashes exploitable for code injection via compromised websites or phishing attacks.

Same-origin policy bypasses in DOM Workers (CVE-2025-13019) and Core/HTML (CVE-2025-13013) further enable data theft or code injection across browser windows.

At the same time, a spoofing issue (CVE-2025-13015) rounds out the lower-severity risks. No in-the-wild exploitation has been reported, but the potential for drive-by downloads makes these flaws a prime target for threat actors.

Urgency For Updates and Broader Implications

Mozilla classifies high-impact vulnerabilities as those allowing attackers to run code and install malware with minimal user action, underscoring the need for immediate updates to Firefox 145, ESR 140.5, or ESR 115.30 via automatic mechanisms or direct download from mozilla.org.

Enterprises relying on ESR for stability should prioritize patching, as unaddressed systems face elevated risks from supply chain attacks or zero-day exploits.

Beyond security, Firefox 145 introduces privacy enhancements, such as improved anti-fingerprinting in Private Browsing and Strict Enhanced Tracking Protection modes, reducing the number of users tracked by half, though these are initially opt-in.

This release aligns with Mozilla’s ongoing commitment to proactive fuzzing and rapid response. However, users must enable auto-updates to maintain protection against evolving threats in the browser ecosystem.

Overall, the patches mitigate serious risks without confirmed active abuse, yet vigilance remains essential for cybersecurity hygiene.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago