CVE-2025-13017

8.1 HIGH

📋 TL;DR

This CVE describes a same-origin policy bypass vulnerability in the DOM Notifications component of Mozilla products. It allows malicious websites to access data from other origins they shouldn't have access to. Affects Firefox, Firefox ESR, Thunderbird, and Thunderbird ESR users running vulnerable versions.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
  • Thunderbird ESR
Versions: Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, Thunderbird < 140.5
Operating Systems: Windows, Linux, macOS, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable. No special configurations required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user data across different websites, including session tokens, personal information, and authentication credentials from other tabs/windows.

🟠

Likely Case

Targeted data theft from specific websites, potentially leading to account takeover or privacy violations.

🟢

If Mitigated

Limited impact if users only visit trusted sites and have strong browser security settings, though risk remains for any cross-origin data.

🌐 Internet-Facing: HIGH - Web browsers are inherently internet-facing and users regularly visit multiple websites.
🏢 Internal Only: MEDIUM - Internal web applications could be targeted if users access them alongside malicious content.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user to visit a malicious website, but no authentication or special permissions needed beyond that.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 145+, Firefox ESR 140.5+, Thunderbird 145+, Thunderbird ESR 140.5+

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-87/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update check and installation. 4. Restart browser when prompted.

🔧 Temporary Workarounds

Disable Notifications

all

Temporarily disable web notifications to prevent exploitation via the vulnerable component

In Firefox: about:preferences#privacy → Permissions → Notifications → Settings → Block new requests

Use Private Browsing

all

Private/incognito mode limits cross-origin data persistence

Ctrl+Shift+P (Windows/Linux) or Cmd+Shift+P (macOS)

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only
  • Implement network filtering to block access to potentially malicious domains

🔍 How to Verify

Check if Vulnerable:

Check browser version in About dialog. If version is below patched versions listed above, system is vulnerable.

Check Version:

Firefox: about:support → Application Basics → Version. Thunderbird: Help → About Thunderbird

Verify Fix Applied:

Confirm version is Firefox 145+, Firefox ESR 140.5+, Thunderbird 145+, or Thunderbird ESR 140.5+

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-origin requests in web server logs
  • Multiple notification permission requests from same site

Network Indicators:

  • Suspicious JavaScript loading patterns
  • Unexpected cross-domain API calls

SIEM Query:

web.url CONTAINS 'notification' AND web.status_code = 200 AND user_agent CONTAINS 'Firefox' AND user_agent VERSION < '145'

🔗 References

📤 Share & Export