CVE-2025-8039

8.1 HIGH

📋 TL;DR

This vulnerability allows search terms to persist in the URL bar after navigating away from search pages, potentially exposing sensitive search queries. It affects Firefox, Firefox ESR, Thunderbird, and Thunderbird ESR users on vulnerable versions. The issue could leak private information through browser history or shared screens.

💻 Affected Systems

Products:
  • Firefox
  • Firefox ESR
  • Thunderbird
  • Thunderbird ESR
Versions: Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 140.1
Operating Systems: All supported operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive search queries (medical, financial, personal) are exposed through browser history, shared screens, or URL sharing, leading to privacy violations, reputational damage, or targeted attacks.

🟠

Likely Case

Accidental exposure of non-critical search terms through browser history or screen sharing, causing minor privacy concerns.

🟢

If Mitigated

Minimal impact if users avoid sensitive searches, clear history regularly, or use private browsing modes.

🌐 Internet-Facing: LOW - This is primarily a client-side privacy issue affecting individual browsers, not a network-facing vulnerability.
🏢 Internal Only: MEDIUM - Internal users could inadvertently expose sensitive organizational searches through shared screens or browser history on shared workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (searching and navigating) but no authentication; primarily a privacy leak rather than a traditional security exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 141, Firefox ESR 140.1, Thunderbird 141, Thunderbird 140.1

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-56/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update check and installation. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Use Private Browsing Mode

all

Private/incognito windows don't save search history, preventing persistence of search terms.

Ctrl+Shift+P (Windows/Linux) or Cmd+Shift+P (macOS) to open private window

Clear Browser History After Sensitive Searches

all

Manually clear history to remove persisted search terms from URL bar history.

Ctrl+Shift+Delete (Windows/Linux) or Cmd+Shift+Delete (macOS) to open clear history dialog

🧯 If You Can't Patch

  • Disable search suggestions in URL bar to reduce exposure
  • Implement policy to restrict sensitive searches on vulnerable systems

🔍 How to Verify

Check if Vulnerable:

1. Open browser. 2. Perform a search. 3. Navigate to a different page. 4. Check if search terms remain in URL bar.

Check Version:

firefox --version (Linux) or Help → About Firefox (GUI)

Verify Fix Applied:

After updating, repeat the check steps; search terms should clear after navigation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of search term persistence in browser logs (if logging enabled)

Network Indicators:

  • None - this is a client-side issue

SIEM Query:

Not applicable for client-side privacy vulnerability

🔗 References

📤 Share & Export