Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14325: Vulnerability in Mozilla Firefox

0
High
VulnerabilityCVE-2025-14325cvecve-2025-14325
Published: Tue Dec 09 2025 (12/09/2025, 13:37:58 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:47:25 UTC

Technical Analysis

CVE-2025-14325 is a vulnerability identified in the Just-In-Time (JIT) compilation component of the JavaScript engine used by Mozilla Firefox and Thunderbird. The flaw is classified under CWE-843, which relates to improper control of code generation, leading to miscompilation during JIT processing. This miscompilation can cause the execution of incorrect or malicious code, potentially allowing attackers to compromise the confidentiality, integrity, and availability of the affected systems. The vulnerability affects all Firefox versions prior to 146 and Thunderbird versions prior to 146 and ESR versions prior to 140.6. The CVSS v3.1 base score is 7.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating that the vulnerability is remotely exploitable over the network without requiring privileges or user interaction, and impacts confidentiality, integrity, and availability to a limited extent. Although no known exploits have been reported in the wild yet, the nature of the vulnerability and its presence in widely used software make it a significant threat. The absence of patch links suggests that fixes may be forthcoming or pending release. The JIT engine is a critical component for performance in JavaScript execution, and its compromise can lead to arbitrary code execution or sandbox escape, making this vulnerability particularly dangerous. Organizations relying on Firefox and Thunderbird for web browsing and email communications should prioritize remediation once patches are available.

Potential Impact

For European organizations, the impact of CVE-2025-14325 can be substantial. Firefox and Thunderbird are widely used across enterprises, government agencies, and critical infrastructure sectors in Europe. Exploitation could lead to unauthorized data disclosure, manipulation of data integrity, or denial of service conditions, affecting business continuity and data privacy compliance (e.g., GDPR). The vulnerability’s remote exploitability without user interaction increases the risk of automated or targeted attacks, potentially enabling attackers to gain footholds within networks or exfiltrate sensitive information. Sectors such as finance, healthcare, and public administration, which rely heavily on secure web and email clients, may face elevated risks. Additionally, the vulnerability could be leveraged in multi-stage attacks, including phishing or drive-by downloads, further amplifying its impact. The lack of known exploits currently provides a window for proactive defense, but the widespread use of affected products necessitates urgent patch management and monitoring.

Mitigation Recommendations

1. Immediate prioritization of patch deployment once Mozilla releases updates for Firefox (≥146) and Thunderbird (≥146 and ESR ≥140.6) to remediate the vulnerability. 2. Until patches are available, consider deploying network-level protections such as web filtering and intrusion prevention systems (IPS) to block or detect exploitation attempts targeting the JavaScript engine. 3. Implement strict endpoint monitoring to detect anomalous behaviors indicative of exploitation, including unusual process executions or memory anomalies related to browser or email client activity. 4. Enforce the use of Content Security Policy (CSP) and disable or limit JavaScript execution in high-risk environments where feasible. 5. Educate users about the risks of visiting untrusted websites and opening suspicious email attachments, as these vectors could be leveraged in exploitation. 6. Maintain up-to-date threat intelligence feeds to quickly identify emerging exploit attempts or indicators of compromise related to this vulnerability. 7. For organizations with critical assets, consider temporary use of alternative browsers or email clients not affected by this vulnerability until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2025-12-09T13:37:58.128Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69382833abbdc4595cd4849f

Added to database: 12/9/2025, 1:46:27 PM

Last enriched: 1/7/2026, 7:47:25 PM

Last updated: 2/5/2026, 2:53:22 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats