CVE-2025-13026

9.8 CRITICAL

📋 TL;DR

This CVE describes a sandbox escape vulnerability in Firefox and Thunderbird's WebGPU component due to incorrect boundary conditions. Attackers can exploit this to break out of browser sandbox protections and execute arbitrary code on affected systems. All users running Firefox < 145 or Thunderbird < 145 are vulnerable.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Thunderbird
Versions: Firefox < 145, Thunderbird < 145
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. WebGPU must be enabled (default in affected versions).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, or establish persistent access to the affected system.

🟠

Likely Case

Remote code execution leading to credential theft, data exfiltration, or ransomware deployment on vulnerable endpoints.

🟢

If Mitigated

Limited impact if proper network segmentation, endpoint protection, and least privilege principles are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction (visiting malicious website or opening malicious email).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 145, Thunderbird 145

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-87/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update to version 145. 4. Restart browser/email client.

🔧 Temporary Workarounds

Disable WebGPU

all

Temporarily disable the vulnerable WebGPU component

about:config → Set 'dom.webgpu.enabled' to false

🧯 If You Can't Patch

  • Block access to untrusted websites and disable email HTML rendering
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check browser version in About Firefox/Thunderbird. If version < 145, system is vulnerable.

Check Version:

firefox --version (Linux) or check About menu (Windows/macOS)

Verify Fix Applied:

Confirm version is 145 or higher in About Firefox/Thunderbird.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from browser processes
  • Sandbox escape attempts in security logs

Network Indicators:

  • Connections to known malicious domains from browser processes

SIEM Query:

Process Creation where Parent Process Name contains 'firefox' OR Parent Process Name contains 'thunderbird' AND Command Line contains unusual parameters

🔗 References

📤 Share & Export