Firefox: Mozilla closes critical sandbox gap in Windows version

Updates for Firefox close a sandbox vulnerability under Windows. It is similar to the one attacked in Google Chrome.

listen Print view
Stylized graphic: Burning Firefox logo on a laptop

Security gaps in Firefox put users at risk.

(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)

2 min. read

Updates are available for the Firefox web browser that close a security vulnerability classified as critical. Under Windows, it allows malicious actors to break out of the sandbox and thus inject and execute malicious code in the system.

In a security announcement, the Mozilla developers explain that they have found similar patterns in Firefox's code for inter-process communication (IPC) following the recently disclosed vulnerability in Google Chrome, which has already been attacked in the wild. "A compromised child process can cause the parent process to return an unintentionally powerful handle, leading to an escape from the sandbox," the developers explain the bug somewhat cryptically (CVE-2025-2857, no CVSS, risk"critical").

The problem only occurs under Windows. Firefox versions 136.0.4, Firefox ESR 115.21.1 and Firefox ESR 128.8.1 correct the security-relevant errors. Anyone using the Mozilla web browsers on Windows should ensure that they use the bug-fixed versions as soon as possible.

Videos by heise

Users can find out whether Firefox is already up to date by opening the version dialog. This opens when the browser menu is clicked, which is hidden behind the "hamburger" symbol with three horizontal lines to the right of the address bar, and the further path via "Help" – "About Firefox".

The version dialog installs the update and then prompts you to restart the browser.

(Image: Screenshot / dmk)

On Wednesday night this week, Google released a security update for the Chrome web browser. It corrected an already attacked vulnerability in the Mojo component of the browser, which provides functions for inter-process communication. Here too, the bug allowed attackers to break out of the sandbox and ultimately execute malicious code.

Kaspersky discovered the attacks on the vulnerability and named them "Operation ForumTroll". A phishing email contained links to manipulated websites. If a victim clicks on it, the website is displayed without any further user interaction and the Windows PC is infected. More in-depth details about the vulnerability are not yet publicly available.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.