Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape.
The original vulnerability was being exploited in the wild.
*This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1956398 | Permissions Required |
| https://issues.chromium.org/issues/405143032 | Permissions Required |
| https://www.cve.org/CVERecord?id=CVE-2025-2783 | Third Party Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-19/ | Vendor Advisory |
Configurations
History
31 Oct 2025, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-668 |
Information
Published : 2025-03-27 14:15
Updated : 2025-10-31 14:16
NVD link : CVE-2025-2857
Mitre link : CVE-2025-2857
CVE.ORG link : CVE-2025-2857
JSON object : View
Products Affected
mozilla
- firefox
CWE
