Mozilla Issues Urgent Firefox Update to Patch Critical Code Execution Flaws


The Mozilla Foundation released three critical security advisories on November 11, 2025, addressing 16 unique vulnerabilities across multiple Firefox versions and platforms.

The updates target Firefox 145, Firefox ESR 115.30, and Firefox ESR 140.5, with 12 vulnerabilities rated High impact and an additional 14 rated Moderate, affecting millions of users worldwide.

CVE IDProductVulnerability TypeSeverity
CVE-2025-13012Firefox ESR 115.30Race conditionHigh
CVE-2025-13013Firefox ESR 115.30Mitigation bypassModerate
CVE-2025-13014Firefox ESR 115.30Use-after-freeModerate
CVE-2025-13015Firefox ESR 115.30Spoofing issueLow
CVE-2025-13012Firefox ESR 140.5Race conditionHigh
CVE-2025-13016Firefox ESR 140.5Incorrect boundary conditionsHigh
CVE-2025-13017Firefox ESR 140.5Same-origin policy bypassModerate
CVE-2025-13018Firefox ESR 140.5Mitigation bypassModerate
CVE-2025-13019Firefox ESR 140.5Same-origin policy bypassModerate
CVE-2025-13020Firefox ESR 140.5Use-after-freeModerate
CVE-2025-13021Firefox 145Incorrect boundary conditionsHigh
CVE-2025-13022Firefox 145Incorrect boundary conditionsHigh
CVE-2025-13023Firefox 145Sandbox escapeHigh
CVE-2025-13024Firefox 145JIT miscompilationHigh
CVE-2025-13025Firefox 145Incorrect boundary conditionsHigh
CVE-2025-13026Firefox 145Sandbox escapeHigh
CVE-2025-13027Firefox 145Memory safety bugsHigh

The most severe flaws enable remote code execution and sandbox escape attacks through WebGPU graphics processing vulnerabilities, JavaScript engine miscompilation, and race conditions in the Graphics component.

According to Mozilla’s impact classification, High-impact vulnerabilities can be exploited by attackers to run arbitrary code and install malicious software requiring no user interaction beyond regular browsing activity.

Several sandbox escape vulnerabilities, listed as CVE-2025-13023 and CVE-2025-13026, represent particularly critical threats because they bypass Firefox’s security sandbox isolation mechanism.

The vulnerability landscape reveals concerning patterns in critical components. WebGPU graphics processing emerges as a significant attack surface, with five separate boundary condition flaws identified.

Researchers from security teams, including Qrious Secure’s Project KillFuzz, identified JIT compilation issues that could lead to arbitrary code execution via specially crafted JavaScript payloads.

Additionally, multiple Same-origin policy bypasses affecting DOM components could allow attackers to access sensitive data from sites in other browser windows or inject malicious code into legitimate web properties.

Firefox ESR versions received patches addressing critical memory safety vulnerabilities through collective bug fixes (CVE-2025-13027).

These long-term support releases serve enterprise and organizational deployments that require extended version stability, making prompt patching essential for institutional security posture.

Mozilla recommends immediate updating to the latest versions: Firefox 145, Firefox ESR 140.5, or Firefox ESR 115.30.

Users can access updates through automatic update mechanisms or by visiting Mozilla’s official website.

The advisory details clarify that exploiting these vulnerabilities requires attackers to deliver malicious content via compromised websites or through network attacks.

Yet, the lack of user interaction beyond standard browsing behavior significantly increases risk exposure across the user base.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link