First published: Tue Apr 29 2025(Updated: )
A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <138 | |
Firefox ESR | <128.10<115.23 | |
Thunderbird | <138 | |
Mozilla Thunderbird | <128.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4083 has been classified as a high severity vulnerability due to its potential to allow sandbox escape.
To mitigate CVE-2025-4083, users should update Firefox and Thunderbird to versions 138 or later and Firefox ESR to versions 128.10 or later.
CVE-2025-4083 could enable malicious content to execute in the top-level document's process, compromising user security.
CVE-2025-4083 affects Firefox versions earlier than 138 and Firefox ESR versions earlier than 128.
Yes, CVE-2025-4083 affects Thunderbird versions prior to 138 and Thunderbird ESR versions prior to 128.10.