CVE-2025-13026
📋 TL;DR
This CVE describes a sandbox escape vulnerability in Firefox and Thunderbird's WebGPU component due to incorrect boundary conditions. Attackers can exploit this to break out of browser sandbox protections and execute arbitrary code on affected systems. All users running Firefox < 145 or Thunderbird < 145 are vulnerable.
💻 Affected Systems
- Mozilla Firefox
- Mozilla Thunderbird
📦 What is this software?
Firefox by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to install malware, steal sensitive data, or establish persistent access to the affected system.
Likely Case
Remote code execution leading to credential theft, data exfiltration, or ransomware deployment on vulnerable endpoints.
If Mitigated
Limited impact if proper network segmentation, endpoint protection, and least privilege principles are implemented.
🎯 Exploit Status
Exploitation requires user interaction (visiting malicious website or opening malicious email).
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 145, Thunderbird 145
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-87/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update to version 145. 4. Restart browser/email client.
🔧 Temporary Workarounds
Disable WebGPU
allTemporarily disable the vulnerable WebGPU component
about:config → Set 'dom.webgpu.enabled' to false
🧯 If You Can't Patch
- Block access to untrusted websites and disable email HTML rendering
- Implement application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check browser version in About Firefox/Thunderbird. If version < 145, system is vulnerable.
Check Version:
firefox --version (Linux) or check About menu (Windows/macOS)
Verify Fix Applied:
Confirm version is 145 or higher in About Firefox/Thunderbird.
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from browser processes
- Sandbox escape attempts in security logs
Network Indicators:
- Connections to known malicious domains from browser processes
SIEM Query:
Process Creation where Parent Process Name contains 'firefox' OR Parent Process Name contains 'thunderbird' AND Command Line contains unusual parameters