Vulnerability Description
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 136.0.4 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1956398Permissions Required
- https://issues.chromium.org/issues/405143032Permissions Required
- https://www.cve.org/CVERecord?id=CVE-2025-2783Third Party Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-19/Vendor Advisory
FAQ
What is CVE-2025-2857?
CVE-2025-2857 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to retur...
How severe is CVE-2025-2857?
CVE-2025-2857 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-2857?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.