CVE-2025-13025

7.5 HIGH

📋 TL;DR

This vulnerability involves incorrect boundary conditions in Firefox and Thunderbird's WebGPU component, allowing memory corruption. Attackers could exploit this to execute arbitrary code or cause denial of service. Users of Firefox < 145 or Thunderbird < 145 are affected.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Thunderbird
Versions: Firefox < 145, Thunderbird < 145
Operating Systems: Windows, macOS, Linux, Android
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations with WebGPU enabled are vulnerable. WebGPU is enabled by default in recent Firefox versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full system compromise, data theft, or malware installation.

🟠

Likely Case

Browser crash or denial of service, potentially enabling sandbox escape in combination with other vulnerabilities.

🟢

If Mitigated

Limited impact due to sandboxing, but potential for memory corruption within the browser process.

🌐 Internet-Facing: HIGH - Web browsers directly interact with untrusted internet content.
🏢 Internal Only: MEDIUM - Risk exists if users access malicious internal web content or emails.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user to visit a malicious website or open a malicious email. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 145, Thunderbird 145

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-87/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update to version 145. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable WebGPU

all

Temporarily disable the WebGPU feature to prevent exploitation.

In Firefox/Thunderbird address bar, type: about:config
Search for: dom.webgpu.enabled
Set to: false

🧯 If You Can't Patch

  • Disable JavaScript in Firefox/Thunderbird settings to reduce attack surface.
  • Use alternative browsers/email clients until patches can be applied.

🔍 How to Verify

Check if Vulnerable:

Check Firefox/Thunderbird version in Help → About. If version is less than 145, the system is vulnerable.

Check Version:

firefox --version (Linux) or check About dialog on Windows/macOS

Verify Fix Applied:

Confirm version is 145 or higher in Help → About. Verify WebGPU functionality works normally if needed.

📡 Detection & Monitoring

Log Indicators:

  • Browser crash reports with WebGPU-related stack traces
  • Unexpected process termination of Firefox/Thunderbird

Network Indicators:

  • Requests to suspicious domains hosting WebGPU content
  • Unusual WebGPU API calls in web traffic

SIEM Query:

source="firefox.log" AND ("crash" OR "WebGPU" OR "out-of-bounds")

🔗 References

📤 Share & Export