CVE-2025-13016
BaseFortify
Publication date: 2025-11-11
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | firefox | From 60.9.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-703 | The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the product. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to incorrect boundary conditions in the JavaScript WebAssembly component of Firefox. It affects versions of Firefox earlier than 145 and Firefox ESR earlier than 140.5, potentially allowing unexpected behavior or exploitation related to memory boundaries in WebAssembly execution.
How can this vulnerability impact me? :
The vulnerability could allow attackers to exploit incorrect boundary checks in the WebAssembly component, potentially leading to memory corruption, crashes, or execution of arbitrary code within affected Firefox versions.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Firefox to version 145 or later, or Firefox ESR to version 140.5 or later.