CVE-2025-8027
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2026-04-13

Assigner: Mozilla Corporation

Description
On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2025-07-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 7 associated CPEs
Vendor Product Version / Range
mozilla firefox From 60.9.0 (exc)
mozilla firefox From 60.9.0 (exc)
mozilla firefox From 60.9.0 (exc)
mozilla firefox From 60.9.0 (exc)
mozilla thunderbird to 140.0 (inc)
mozilla thunderbird to 140.0 (inc)
mozilla thunderbird to 140.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-457 The code uses a variable that has not been initialized, leading to unpredictable or unintended results.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs on 64-bit platforms where the IonMonkey-JIT compiler only writes 32 bits of a 64-bit return value on the stack, while the Baseline-JIT compiler reads the full 64 bits. This mismatch can lead to incorrect or unexpected behavior in Firefox and Thunderbird versions before the specified updates.


How can this vulnerability impact me? :

The vulnerability can cause incorrect handling of return values in affected Firefox and Thunderbird versions, potentially leading to application instability, crashes, or security issues due to improper data being read or executed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart