Firefox Releases Security Update to Fix Multiple Vulnerabilities Allowing Arbitrary Code Execution

Mozilla released Firefox 145 on November 11, 2025, to address critical security vulnerabilities that could allow attackers to execute arbitrary code on users’ systems.

The update patches 16 CVEs affecting the browser’s graphics, JavaScript, and DOM components, with eight rated high severity.

The most critical issue is CVE-2025-13027, a cluster of memory safety bugs discovered by Mozilla’s Fuzzing Team in Firefox 144 and Thunderbird 144.

These flaws demonstrate memory corruption patterns that determined attackers could exploit to achieve remote code execution, potentially bypassing browser sandboxes and compromising entire devices.

WebGPU Vulnerabilities Pose Major Threat

The graphics and WebGPU components contained the most serious flaws. Security researchers Atte Kettunen and Oskar L reported CVE-2025-13021, CVE-2025-13022, and CVE-2025-13025, involving incorrect boundary conditions in WebGPU processing.

These vulnerabilities could trigger out-of-bounds memory access, leading to crashes or code injection when rendering malicious web content.

Most concerning are CVE-2025-13023 and CVE-2025-13026, which enable sandbox escapes.

These flaws allow restricted code to escape the browser’s security sandbox and access sensitive system resources.

As web applications increasingly leverage WebGPU for high-performance graphics rendering, these components have become attractive targets for attackers.

The JavaScript engine also contained critical vulnerabilities. CVE-2025-13016, discovered by Igor Morgenstern, fixes boundary errors in WebAssembly, while CVE-2025-13024 from Project KillFuzz addresses JIT miscompilation that could optimize malicious code for execution.

A race condition in graphics processing (CVE-2025-13012) creates additional timing-based attack opportunities.

Moderate-impact vulnerabilities include same-origin policy bypasses in DOM components (CVE-2025-13017, CVE-2025-13019) and mitigation bypasses (CVE-2025-13018, CVE-2025-13013).

WebRTC use-after-free errors (CVE-2025-13020, CVE-2025-13014) could expose audio and video streams.

Firefox 145 Security Vulnerabilities

CVE IDSeverityComponentVulnerability Type
CVE-2025-13027HighMultiple (Memory safety)Memory corruption
CVE-2025-13021HighGraphics: WebGPUIncorrect boundary conditions
CVE-2025-13022HighGraphics: WebGPUIncorrect boundary conditions
CVE-2025-13023HighGraphics: WebGPUSandbox escape
CVE-2025-13024HighJavaScript Engine: JITJIT miscompilation
CVE-2025-13025HighGraphics: WebGPUIncorrect boundary conditions
CVE-2025-13026HighGraphics: WebGPUSandbox escape
CVE-2025-13016HighJavaScript: WebAssemblyIncorrect boundary conditions
CVE-2025-13012ModerateGraphicsRace condition
CVE-2025-13017ModerateDOM: NotificationsSame-origin policy bypass
CVE-2025-13018ModerateDOM: SecurityMitigation bypass
CVE-2025-13019ModerateDOM: WorkersSame-origin policy bypass
CVE-2025-13013ModerateDOM: Core & HTMLMitigation bypass
CVE-2025-13020LowWebRTC: Audio/VideoUse-after-free
CVE-2025-13014LowAudio/VideoUse-after-free
CVE-2025-13015LowFirefox UISpoofing

Mozilla reports no confirmed in-the-wild exploitation, but the high-impact nature of these vulnerabilities warrants immediate action.

Users on unpatched versions face elevated risks from drive-by downloads and phishing attacks.

Firefox users should immediately upgrade to version 145 via mozilla.org or enable automatic updates to protect against potential exploitation.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here