CVE-2025-13022

9.8 CRITICAL

📋 TL;DR

A critical vulnerability in Firefox and Thunderbird's WebGPU component allows memory corruption due to incorrect boundary conditions. Attackers can exploit this to execute arbitrary code or cause denial of service. All users running affected versions are at risk.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Thunderbird
Versions: Firefox < 145, Thunderbird < 145
Operating Systems: Windows, Linux, macOS, Android
Default Config Vulnerable: ⚠️ Yes
Notes: WebGPU must be enabled (default in affected versions). All configurations with affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Browser/email client crash (denial of service) or limited code execution in sandboxed context.

🟢

If Mitigated

Minimal impact if systems are patched, isolated, or have additional security controls.

🌐 Internet-Facing: HIGH - Exploitable via malicious websites or emails without user interaction.
🏢 Internal Only: MEDIUM - Requires user to visit malicious internal sites or open malicious emails.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious WebGPU content but no authentication. No public exploits confirmed yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 145, Thunderbird 145

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-87/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Go to Settings > Help > About Firefox/Thunderbird. 3. Allow automatic update to version 145. 4. Restart the application.

🔧 Temporary Workarounds

Disable WebGPU

all

Temporarily disable the vulnerable WebGPU component.

In Firefox/Thunderbird address bar, type 'about:config', search for 'dom.webgpu.enabled', set to false

🧯 If You Can't Patch

  • Restrict access to untrusted websites and email content.
  • Use application sandboxing or isolation techniques.

🔍 How to Verify

Check if Vulnerable:

Check application version in About Firefox/Thunderbird. If version is below 145, system is vulnerable.

Check Version:

firefox --version (Linux) or check About menu (all platforms)

Verify Fix Applied:

Confirm version is 145 or higher in About dialog and verify WebGPU functionality if needed.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with WebGPU-related errors
  • Unexpected memory access patterns

Network Indicators:

  • Requests to known malicious domains hosting WebGPU exploit code

SIEM Query:

source="firefox.log" AND ("WebGPU" OR "gpu-process-crash")

🔗 References

📤 Share & Export