CVE-2025-8027
BaseFortify
Publication date: 2025-07-22
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | thunderbird | to 140.0 (inc) |
| mozilla | thunderbird | to 140.0 (inc) |
| mozilla | thunderbird | to 140.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-457 | The code uses a variable that has not been initialized, leading to unpredictable or unintended results. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs on 64-bit platforms where the IonMonkey-JIT compiler only writes 32 bits of a 64-bit return value on the stack, while the Baseline-JIT compiler reads the full 64 bits. This mismatch can lead to incorrect or unexpected behavior in Firefox and Thunderbird versions before the specified updates.
How can this vulnerability impact me? :
The vulnerability can cause incorrect handling of return values in affected Firefox and Thunderbird versions, potentially leading to application instability, crashes, or security issues due to improper data being read or executed.