CVE-2025-10859: Vulnerability in Mozilla Firefox for iOS
Cookie storage for non-HTML temporary documents was being shared incorrectly with normal browsing content, allowing information from private tabs to escape Incognito mode even after the user closed all tabs This vulnerability affects Firefox for iOS < 143.1.
AI Analysis
Technical Summary
CVE-2025-10859 is a vulnerability identified in Mozilla Firefox for iOS versions earlier than 143.1, involving improper cookie storage handling. Specifically, cookie storage for non-HTML temporary documents was shared incorrectly with normal browsing content. This flaw allows information from private browsing (Incognito mode) tabs to escape isolation and be accessible outside the private session, even after the user closes all private tabs. The issue stems from a failure to segregate cookie storage contexts properly, violating the expected privacy guarantees of Incognito mode. The vulnerability is classified under CWE-359 (Exposure of Private Information Through Persistent Cookie), indicating a design weakness in managing cookie persistence and isolation. The CVSS 3.1 base score is 4.0 (medium severity), with vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack requires local access (local vector), low complexity, no privileges or user interaction, and impacts confidentiality only. No integrity or availability impacts are noted. No known exploits have been reported in the wild, and no official patches are linked yet, though the fixed version is identified as Firefox for iOS 143.1 or later. This vulnerability compromises user privacy by leaking data from private tabs, which could expose sensitive browsing information. It is particularly relevant for users relying on Firefox’s private browsing for confidentiality on iOS devices. The issue highlights the importance of strict cookie and session isolation in browsers to maintain privacy boundaries.
Potential Impact
For European organizations, the primary impact is the potential leakage of sensitive or confidential browsing information from private tabs on Firefox for iOS devices. This could lead to exposure of browsing habits, session tokens, or other private data that users expect to remain isolated in Incognito mode. Sectors such as finance, legal, healthcare, and government, where privacy is paramount, may face increased risk of data leakage through compromised private browsing sessions. Although the vulnerability does not allow code execution or system compromise, the breach of confidentiality could facilitate targeted social engineering, profiling, or unauthorized data collection. The impact is limited to devices running vulnerable Firefox for iOS versions and requires local access, so remote exploitation or large-scale attacks are unlikely. However, the widespread use of iOS devices and Firefox in Europe means many users could be affected if they do not update promptly. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation. Organizations with BYOD policies or mobile workforces should be particularly vigilant to prevent inadvertent data leaks via this vulnerability.
Mitigation Recommendations
1. Update Firefox for iOS to version 143.1 or later as soon as the patch is available to ensure the vulnerability is remediated. 2. Until the patch is applied, advise users to avoid using private browsing mode on Firefox for iOS for sensitive activities or confidential sessions. 3. Implement mobile device management (MDM) policies to enforce browser updates and restrict installation of outdated or vulnerable app versions. 4. Monitor network traffic and endpoint logs for unusual cookie or session data transmissions that could indicate leakage. 5. Educate users on the limitations of private browsing modes and the importance of applying security updates promptly. 6. Consider alternative secure browsing solutions or hardened browsers for sensitive use cases on iOS devices. 7. Regularly audit and review browser configurations and privacy settings to ensure compliance with organizational security policies. 8. Coordinate with Mozilla security advisories and subscribe to vulnerability notifications to stay informed about patches and exploit developments.
Affected Countries
United Kingdom, Germany, France, Sweden, Norway, Denmark, Netherlands, Finland, Ireland
CVE-2025-10859: Vulnerability in Mozilla Firefox for iOS
Description
Cookie storage for non-HTML temporary documents was being shared incorrectly with normal browsing content, allowing information from private tabs to escape Incognito mode even after the user closed all tabs This vulnerability affects Firefox for iOS < 143.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-10859 is a vulnerability identified in Mozilla Firefox for iOS versions earlier than 143.1, involving improper cookie storage handling. Specifically, cookie storage for non-HTML temporary documents was shared incorrectly with normal browsing content. This flaw allows information from private browsing (Incognito mode) tabs to escape isolation and be accessible outside the private session, even after the user closes all private tabs. The issue stems from a failure to segregate cookie storage contexts properly, violating the expected privacy guarantees of Incognito mode. The vulnerability is classified under CWE-359 (Exposure of Private Information Through Persistent Cookie), indicating a design weakness in managing cookie persistence and isolation. The CVSS 3.1 base score is 4.0 (medium severity), with vector AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack requires local access (local vector), low complexity, no privileges or user interaction, and impacts confidentiality only. No integrity or availability impacts are noted. No known exploits have been reported in the wild, and no official patches are linked yet, though the fixed version is identified as Firefox for iOS 143.1 or later. This vulnerability compromises user privacy by leaking data from private tabs, which could expose sensitive browsing information. It is particularly relevant for users relying on Firefox’s private browsing for confidentiality on iOS devices. The issue highlights the importance of strict cookie and session isolation in browsers to maintain privacy boundaries.
Potential Impact
For European organizations, the primary impact is the potential leakage of sensitive or confidential browsing information from private tabs on Firefox for iOS devices. This could lead to exposure of browsing habits, session tokens, or other private data that users expect to remain isolated in Incognito mode. Sectors such as finance, legal, healthcare, and government, where privacy is paramount, may face increased risk of data leakage through compromised private browsing sessions. Although the vulnerability does not allow code execution or system compromise, the breach of confidentiality could facilitate targeted social engineering, profiling, or unauthorized data collection. The impact is limited to devices running vulnerable Firefox for iOS versions and requires local access, so remote exploitation or large-scale attacks are unlikely. However, the widespread use of iOS devices and Firefox in Europe means many users could be affected if they do not update promptly. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation. Organizations with BYOD policies or mobile workforces should be particularly vigilant to prevent inadvertent data leaks via this vulnerability.
Mitigation Recommendations
1. Update Firefox for iOS to version 143.1 or later as soon as the patch is available to ensure the vulnerability is remediated. 2. Until the patch is applied, advise users to avoid using private browsing mode on Firefox for iOS for sensitive activities or confidential sessions. 3. Implement mobile device management (MDM) policies to enforce browser updates and restrict installation of outdated or vulnerable app versions. 4. Monitor network traffic and endpoint logs for unusual cookie or session data transmissions that could indicate leakage. 5. Educate users on the limitations of private browsing modes and the importance of applying security updates promptly. 6. Consider alternative secure browsing solutions or hardened browsers for sensitive use cases on iOS devices. 7. Regularly audit and review browser configurations and privacy settings to ensure compliance with organizational security policies. 8. Coordinate with Mozilla security advisories and subscribe to vulnerability notifications to stay informed about patches and exploit developments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-09-22T18:14:38.909Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68dc71325d588c52e5de478d
Added to database: 10/1/2025, 12:09:22 AM
Last enriched: 10/31/2025, 4:41:06 AM
Last updated: 11/14/2025, 3:03:17 PM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-4273: Stack-based Buffer Overflow in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-4194: Incorrect Authorization in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-3773: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-3640: Observable Discrepancy in Red Hat Red Hat Enterprise Linux 9
HighCVE-2024-21635: CWE-287: Improper Authentication in usememos memos
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.