CVE-2025-13019

8.1 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass the same-origin policy in Firefox and Thunderbird by exploiting a flaw in the DOM Workers component. It enables malicious websites to access data from other origins, potentially leading to information theft. Affected users include those running vulnerable versions of Firefox, Firefox ESR, Thunderbird, and Thunderbird ESR.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
  • Thunderbird ESR
Versions: Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, Thunderbird < 140.5
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user session data, credentials, and sensitive information from other websites through cross-origin data theft.

🟠

Likely Case

Targeted attacks stealing authentication tokens, session cookies, or personal data from other websites the user has open.

🟢

If Mitigated

Limited impact if users only visit trusted sites and have strong browser security settings, though risk remains for any cross-origin interactions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user to visit a malicious website but no authentication is needed. The vulnerability is in the browser's core security mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 145, Firefox ESR 140.5, Thunderbird 145, Thunderbird 140.5

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-87/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update check and installation. 4. Restart browser when prompted.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript to prevent exploitation, though this breaks most website functionality.

about:config → javascript.enabled = false

Use Strict Content Security Policy

all

Implement CSP headers to restrict script execution and worker creation.

Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only
  • Implement network segmentation to isolate vulnerable browsers from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check browser version in About Firefox/Thunderbird menu. If version is below patched versions, system is vulnerable.

Check Version:

firefox --version or thunderbird --version

Verify Fix Applied:

Verify version is Firefox ≥145, Firefox ESR ≥140.5, Thunderbird ≥145, or Thunderbird ≥140.5.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-origin requests in web server logs
  • Multiple worker creation attempts from single origin

Network Indicators:

  • Suspicious JavaScript loading patterns
  • Unexpected postMessage communications between origins

SIEM Query:

source="web_proxy" AND (url="*worker.js" OR url="*blob:*") AND status=200 | stats count by src_ip

🔗 References

📤 Share & Export