We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-2857



Description

Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.

Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-03-28 | Assigner mozilla

Problem types

Incorrect handle could lead to sandbox escapes

Product status

Any version before 136.0.4
affected

Any version before 128.8.1
affected

Any version before 115.21.1
affected

Credits

Andrew McCreight

References

bugzilla.mozilla.org/show_bug.cgi?id=1956398

issues.chromium.org/issues/405143032 (CVE-2025-2783)

www.cve.org/CVERecord?id=CVE-2025-2783 (CVE-2025-2783)

www.mozilla.org/security/advisories/mfsa2025-19/

cve.org (CVE-2025-2857)

nvd.nist.gov (CVE-2025-2857)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-2857

Support options

Helpdesk Chat, Email, Knowledgebase