Mozilla Foundation Security Advisory 2025-56
Security Vulnerabilities fixed in Firefox 141
- Announced
- July 22, 2025
- Impact
- high
- Products
- Firefox
- Fixed in
-
- Firefox 141
#CVE-2025-8027: JavaScript engine only wrote partial return value to stack
- Reporter
- Nan Wang
- Impact
- high
Description
On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits.
References
#CVE-2025-8028: Large branch table could lead to truncated instruction
- Reporter
- Gary Kwong
- Impact
- high
Description
On arm64, a WASM br_table
instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address.
References
#CVE-2025-8041: Incorrect URL truncation in Firefox for Android
- Reporter
- Chris Peterson and Kirtikumar Anandrao Ramchandani
- Impact
- moderate
Description
In the address bar, Firefox for Android truncated the display of URLs from the end instead of prioritizing the origin.
References
#CVE-2025-8042: Sandboxed iframe could start downloads
- Reporter
- Axel Chong (@Haxatron)
- Impact
- moderate
Description
Firefox for Android allowed a sandboxed iframe without the allow-downloads
attribute to start downloads.
References
#CVE-2025-8029: javascript: URLs executed on object and embed tags
- Reporter
- Mirko Brodesser
- Impact
- moderate
Description
Firefox executed javascript:
URLs when used in object
and embed
tags.
References
#CVE-2025-8036: DNS rebinding circumvents CORS
- Reporter
- Viktor Bocz
- Impact
- moderate
Description
Firefox cached CORS preflight responses across IP address changes. This allowed circumventing CORS with DNS rebinding.
References
#CVE-2025-8037: Nameless cookies shadow secure cookies
- Reporter
- Uku Sõrmus
- Impact
- moderate
Description
Setting a nameless cookie with an equals sign in the value shadowed other cookies. Even if the nameless cookie was set over HTTP and the shadowed cookie included the Secure
attribute.
References
#CVE-2025-8030: Potential user-assisted code execution in “Copy as cURL” command
- Reporter
- Ameen Basha M K
- Impact
- moderate
Description
Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code.
References
#CVE-2025-8043: Incorrect URL truncation
- Reporter
- alayersattackers
- Impact
- moderate
Description
Focus incorrectly truncated URLs towards the beginning instead of around the origin.
References
#CVE-2025-8031: Incorrect URL stripping in CSP reports
- Reporter
- Tom Schuster
- Impact
- moderate
Description
The username:password
part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials.
References
#CVE-2025-8032: XSLT documents could bypass CSP
- Reporter
- Joe Turki
- Impact
- moderate
Description
XSLT document loading did not correctly propagate the source document which bypassed its CSP.
References
#CVE-2025-8038: CSP frame-src was not correctly enforced for paths
- Reporter
- Laurin Weger
- Impact
- low
Description
Firefox ignored paths when checking the validity of navigations in a frame.
References
#CVE-2025-8039: Search terms persisted in URL bar
- Reporter
- Sören Hentzschel
- Impact
- low
Description
In some cases search terms persisted in the URL bar even after navigating away from the search page.
References
#CVE-2025-8033: Incorrect JavaScript state machine for generators
- Reporter
- Shaheen Fazim
- Impact
- low
Description
The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref.
References
#CVE-2025-8044: Memory safety bugs fixed in Firefox 141 and Thunderbird 141
- Reporter
- Akmat Suleimanov, Andrew McCreight
- Impact
- high
Description
Memory safety bugs present in Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
- Reporter
- the Mozilla Fuzzing Team
- Impact
- high
Description
Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-8040: Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
- Reporter
- Andrew McCreight, Ashley Zebrowski
- Impact
- high
Description
Memory safety bugs present in Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
- Reporter
- the Mozilla Fuzzing Team
- Impact
- high
Description
Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.