Advisory

Mozilla patches multiple high severity flaws in Firefox and Thunderbird

Take action: If you're using Mozilla Firefox or Thunderbird, time for a big update. Update to Firefox 144, Firefox ESR 115.29/140.4, or Thunderbird 144/ESR 140.4. There are multiple vulnerabilities and even if Mozilla hasn't ranked them critical, they may be exploited. Patching is very easy and all your tabs reopen. So don't ignore this update.


Learn More

Mozilla has released security updates patching multiple high-severity vulnerabilities in its Firefox and Thunderbird product lines

Vulnerabilities summary:

  • CVE-2025-11708 (CVSS score 9.8, Mozilla score High): Use-after-free vulnerability in MediaTrackGraphImpl::GetInstance() that could lead to memory corruption
  • CVE-2025-11709 ((CVSS score 9.8, Mozilla score High): Out-of-bounds read/write operations in privileged processes triggered through manipulated WebGL textures
  • CVE-2025-11710 (CVSS score 9.8, Mozilla score High): Cross-process information disclosure through malicious IPC messages exposing memory blocks
  • CVE-2025-11721 (CVSS score 9.8, Mozilla score High): Memory safety bug specific to Firefox 143 and Thunderbird 143 with potential for code execution
  • CVE-2025-11714 (CVSS score 8.8, Mozilla score High): Multiple memory safety bugs affecting all product versions with evidence of exploitable memory corruption
  • CVE-2025-11715 (CVSS score 8.8, Mozilla score High): Additional memory safety bugs in Firefox ESR 140.x and Thunderbird ESR 140.x branches
  • CVE-2025-11711 (CVSS score 6.5, Mozilla score High): Bypass of JavaScript Object property write protections allowing modification of non-writable properties

     

  • CVE-2025-11719 (CVSS score 9.8, Mozilla score Moderate): Use-after-free in native messaging web extension API on Windows
  • CVE-2025-11717 (CVSS score 9.1, Mozilla score Moderate): Password edit screen visibility issue in Android card view
  • CVE-2025-11713 (CVSS score 8.1, Mozilla score Moderate): Code execution through "Copy as cURL" command on Windows systems
  • CVE-2025-11720 (CVSS score 8.1, Mozilla score Moderate): Spoofing risk in Android custom tabs displaying incomplete hostname information
  • CVE-2025-11716 (CVSS score 6.5, Mozilla score Moderate): Sandboxed iframe permission bypass on Android
  • CVE-2025-11718 (CVSS score 6.5, Mozilla score Moderate): Address bar spoofing on Android using visibilitychange events
  • CVE-2025-11712 (CVSS score 6.1, Mozilla score Moderate): OBJECT tag type attribute override allowing XSS contributions

Users should update patches to Firefox 144, Firefox ESR 115.29 and 140.4, Thunderbird 144 or ESR 140.4. The vulnerabilities in Thunderbird, generally cannot be exploited through email because scripting is disabled when reading mail, but they remain potential risks in browser or browser-like contexts.

Mozilla patches multiple high severity flaws in Firefox and Thunderbird