Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14860: Vulnerability in Mozilla Firefox

0
Critical
VulnerabilityCVE-2025-14860cvecve-2025-14860
Published: Thu Dec 18 2025 (12/18/2025, 14:21:13 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 146.0.1.

AI-Powered Analysis

AILast updated: 12/25/2025, 15:10:15 UTC

Technical Analysis

CVE-2025-14860 is a critical security vulnerability identified in Mozilla Firefox versions prior to 146.0.1. The flaw is a use-after-free (CWE-416) vulnerability located within the Disability Access APIs component of the browser. Use-after-free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially allowing attackers to execute arbitrary code, cause a denial of service, or leak sensitive information. This particular vulnerability is remotely exploitable without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality, integrity, and availability is high, with the CVSS score of 9.8 reflecting the critical nature of this flaw. Although no known exploits have been reported in the wild yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise systems via Firefox. The lack of patch links in the provided data suggests that the fix is either newly released or pending, emphasizing the urgency for users to update promptly. The vulnerability affects all Firefox versions below 146.0.1, which implies a broad scope given Firefox's widespread adoption globally.

Potential Impact

For European organizations, the impact of CVE-2025-14860 could be severe. Firefox is a widely used browser across Europe in both private and public sectors, including critical infrastructure, government agencies, and enterprises. Exploitation could lead to full system compromise, data breaches, and disruption of services. Confidential information handled through Firefox sessions could be exposed or manipulated, threatening privacy compliance frameworks such as GDPR. The vulnerability's ability to be exploited remotely without user interaction increases the risk of automated attacks and wormable exploits, potentially leading to rapid spread within networks. Organizations relying on Firefox for secure communications or access to sensitive web applications face heightened risk. Additionally, the disruption of availability could impact business continuity and critical operations. The absence of known exploits currently provides a window for proactive mitigation, but the critical severity demands immediate attention.

Mitigation Recommendations

European organizations should immediately update all Firefox installations to version 146.0.1 or later to remediate the vulnerability. Where immediate patching is not feasible, implement network-level protections such as web filtering and intrusion prevention systems to block exploitation attempts targeting the Disability Access APIs. Employ endpoint detection and response (EDR) tools to monitor for suspicious behaviors indicative of use-after-free exploitation. Disable or restrict the Disability Access APIs component if possible, pending official guidance from Mozilla. Conduct internal audits to identify all Firefox deployments, including legacy systems, and prioritize patching accordingly. Educate users about the importance of browser updates and monitor threat intelligence feeds for emerging exploit reports. Additionally, enforce strict network segmentation to limit lateral movement in case of compromise. Regularly back up critical data and test incident response plans to prepare for potential exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2025-12-18T00:22:09.553Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69440f154eb3efac368cd702

Added to database: 12/18/2025, 2:26:29 PM

Last enriched: 12/25/2025, 3:10:15 PM

Last updated: 2/7/2026, 12:14:42 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats