Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14330: Vulnerability in Mozilla Firefox

0
Critical
VulnerabilityCVE-2025-14330cvecve-2025-14330
Published: Tue Dec 09 2025 (12/09/2025, 13:38:05 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 146, Firefox ESR < 140.6, Thunderbird < 146, and Thunderbird < 140.6.

AI-Powered Analysis

AILast updated: 12/16/2025, 15:05:20 UTC

Technical Analysis

CVE-2025-14330 is a critical security vulnerability identified in the Just-In-Time (JIT) compiler component of the JavaScript engine used by Mozilla Firefox and Thunderbird. The vulnerability arises from a miscompilation issue in the JIT compiler, which can cause the execution of maliciously crafted JavaScript code to behave unexpectedly, potentially allowing an attacker to execute arbitrary code on the victim's machine. This flaw affects Firefox versions earlier than 146 and Firefox ESR versions earlier than 140.6, as well as Thunderbird versions earlier than 146 and ESR versions earlier than 140.6. The vulnerability is classified under multiple CWEs including CWE-686 (Function Call With Incorrect Variable or Reference as Argument), CWE-843 (Access of Resource Using Incompatible Type), and CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating issues related to memory safety and type confusion. The CVSS v3.1 base score is 9.8 (critical), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been reported in the wild yet, the vulnerability's characteristics make it highly exploitable remotely without user interaction, posing a significant threat to users of affected Mozilla products. The lack of patch links suggests that fixes may be forthcoming or pending release. This vulnerability could allow attackers to execute arbitrary code, potentially leading to full system compromise, data theft, or denial of service.

Potential Impact

For European organizations, the impact of CVE-2025-14330 is substantial. Firefox and Thunderbird are widely used across enterprises, government agencies, and critical infrastructure sectors in Europe for web browsing and email communication. Successful exploitation could lead to remote code execution, enabling attackers to gain unauthorized access to sensitive data, deploy malware, or disrupt services. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity and availability impacts could disrupt business operations, especially in sectors such as finance, healthcare, and public administration that rely heavily on these applications. The vulnerability's ease of exploitation and lack of required privileges or user interaction increase the risk of widespread attacks, including targeted espionage or ransomware campaigns. European organizations with remote workforces or those using Firefox and Thunderbird in cloud or virtualized environments are particularly vulnerable. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate attention.

Mitigation Recommendations

European organizations should prioritize upgrading Mozilla Firefox and Thunderbird to versions 146 or later (and ESR 140.6 or later) as soon as patches are released. Until patches are available, organizations should consider implementing network-level protections such as web filtering to block malicious JavaScript content and restrict access to untrusted websites. Employing endpoint detection and response (EDR) solutions capable of identifying anomalous process behavior related to JIT compilation or script execution can provide early warning. Disabling or restricting JavaScript execution in high-risk environments or on sensitive systems may be warranted temporarily. Security teams should monitor Mozilla security advisories and threat intelligence feeds for exploit developments and indicators of compromise. Conducting internal vulnerability scans and penetration tests focusing on browser security can help identify exposure. User awareness campaigns should emphasize the importance of applying updates promptly. Finally, organizations should ensure robust backup and incident response plans are in place to mitigate potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2025-12-09T13:38:05.412Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69382835abbdc4595cd484f1

Added to database: 12/9/2025, 1:46:29 PM

Last enriched: 12/16/2025, 3:05:20 PM

Last updated: 2/7/2026, 1:55:43 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats