CVE-2025-1018
📋 TL;DR
This vulnerability allows attackers to hide the fullscreen notification in Firefox and Thunderbird by rapidly requesting fullscreen mode, enabling potential UI spoofing attacks. It affects users running Firefox versions below 135 and Thunderbird versions below 135.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
An attacker could create convincing phishing pages that hide browser UI elements, tricking users into entering sensitive information or downloading malware.
Likely Case
Limited phishing attempts that might trick some users into clicking malicious elements, but requires user interaction and specific timing.
If Mitigated
With proper browser security settings and user awareness, impact is minimal as it requires user interaction and doesn't bypass core security controls.
🎯 Exploit Status
Exploitation requires JavaScript execution and specific timing of fullscreen requests. No known public exploits at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 135, Thunderbird 135
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-07/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Browser will check for updates and install if available. 4. Restart browser when prompted.
🔧 Temporary Workarounds
Disable JavaScript
allPrevents exploitation by blocking JavaScript execution
about:config → javascript.enabled = false
Use Enhanced Tracking Protection
allBlocks some malicious scripts
Settings → Privacy & Security → Enhanced Tracking Protection → Strict
🧯 If You Can't Patch
- Use alternative browsers for sensitive activities
- Implement web filtering to block known malicious sites
🔍 How to Verify
Check if Vulnerable:
Check browser version in About Firefox/Thunderbird menu
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Confirm version is 135 or higher in About dialog
📡 Detection & Monitoring
Log Indicators:
- Multiple rapid fullscreen API calls in short timeframe
- Unusual JavaScript behavior patterns
Network Indicators:
- Suspicious domains hosting JavaScript that manipulates fullscreen API
SIEM Query:
source="browser_logs" AND (event="fullscreen_request" count>5 within 1s)