[CIVN-2025-0305] Multiple Vulnerabilities in Mozilla Products

By Published On: November 13, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Mozilla Products 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Mozilla Firefox versions prior to 145
Mozilla Firefox ESR versions prior to 140.5
Mozilla Firefox ESR versions prior to 115.30
Overview
Multiple vulnerabilities have been reported in Mozilla products which could allow an attacker to execute arbitrary code on the targeted system.
Target Audience:
ll end-user organizations and individuals using Mozilla Products.
Risk Assessment:
igh risk of unauthorized access to sensitive information.
Impact Assessment:
otential for data theft, sensitive information disclosure and complete compromise of system.
Description
Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that re-quire long-term support with only security and maintenance updates.
Multiple vulnerabilities exist in Mozilla products due to Race condition in the Graphics compo-nent; Mitigation bypass in the DOM, Use-after-free in the Audio/Video component, WebRTC; Spoofing issue in Firefox, Incorrect boundary conditions in the JavaScript, Graphics;  Same-origin policy bypass in the DOM; Sandbox escape due to incorrect boundary conditions in the Graphics; JIT miscompilation in the JavaScript Engine and Memory safety bugs.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://www.mozilla.org/en-US/security/advisories/mfsa2025-87/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-88/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-89/
Vendor Information
Mozilla
https://www.mozilla.org/en-US/security/advisories/mfsa2025-87/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-88/
https://www.mozilla.org/en-US/security/advisories/mfsa2025-89/
CVE Name
CVE-2025-13012
CVE-2025-13013
CVE-2025-13014
CVE-2025-13015
CVE-2025-13016
CVE-2025-13017
CVE-2025-13018
CVE-2025-13019
CVE-2025-13020
CVE-2025-13021
CVE-2025-13022
CVE-2025-13023
CVE-2025-13024
CVE-2025-13025
CVE-2025-13026
CVE-2025-13027
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=hhV7
—–END PGP SIGNATURE—–

Share this article