CVE-2025-4918

9.8 CRITICAL

📋 TL;DR

This vulnerability allows an attacker to perform out-of-bounds memory operations on JavaScript Promise objects, potentially leading to arbitrary code execution. It affects Firefox, Firefox ESR, and Thunderbird users running outdated versions. Attackers could exploit this by tricking users into visiting malicious websites.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
Versions: Firefox < 138.0.4, Firefox ESR < 128.10.1, Firefox ESR < 115.23.1, Thunderbird < 128.10.2, Thunderbird < 138.0.2
Operating Systems: Windows, Linux, macOS, All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special settings required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges, complete system compromise, data theft, and persistent backdoor installation.

🟠

Likely Case

Browser crash, memory corruption leading to information disclosure, or limited code execution within browser sandbox.

🟢

If Mitigated

Browser crash with no data loss if sandboxing works properly, or exploit blocked by security controls.

🌐 Internet-Facing: HIGH - Web browsers are inherently internet-facing and users regularly visit untrusted websites.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal websites.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires JavaScript execution in browser context. No authentication needed - visiting malicious website is sufficient.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 138.0.4, Firefox ESR 128.10.1, Firefox ESR 115.23.1, Thunderbird 128.10.2, Thunderbird 138.0.2

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-36/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Browser will check for updates and prompt to install. 4. Restart browser when update completes. 5. Verify version matches patched versions above.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript execution to prevent exploitation

about:config → javascript.enabled = false

Use Content Security Policy

all

Implement strict CSP headers to restrict script execution

Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Restrict browser usage to trusted websites only
  • Implement network filtering to block malicious domains and scripts

🔍 How to Verify

Check if Vulnerable:

Check browser version in About dialog. If version matches affected ranges, system is vulnerable.

Check Version:

Firefox: about:support → Application Basics → Version. Thunderbird: Help → About Thunderbird

Verify Fix Applied:

Verify browser version matches patched versions: Firefox ≥138.0.4, Firefox ESR ≥128.10.1 or ≥115.23.1, Thunderbird ≥128.10.2 or ≥138.0.2

📡 Detection & Monitoring

Log Indicators:

  • Browser crash logs with memory access violations
  • Unexpected process termination
  • High memory usage patterns

Network Indicators:

  • Requests to known malicious domains hosting exploit code
  • Unusual JavaScript execution patterns

SIEM Query:

source="browser_logs" AND (event="crash" OR event="memory_violation") AND version<"138.0.4"

🔗 References

📤 Share & Export