Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Firefox 141 Released With Fix for Multiple Vulnerabilities

Posted on July 23, 2025July 23, 2025 By CWS

Mozilla has launched Firefox 141 to handle 17 safety vulnerabilities, together with a number of high-impact flaws that would doubtlessly permit arbitrary code execution. 

The Mozilla Basis Safety Advisory, introduced on July 22, 2025, urges customers to replace instantly to guard towards these crucial safety points.

Key Takeaways1. Firefox 141 patches crucial vulnerabilities that would permit code execution.2. Excessive-impact bugs have an effect on core browser capabilities on 64-bit and ARM methods.3. Mozilla urges instant replace to guard towards these safety dangers.

JavaScript Engine and Reminiscence Security Flaws 

Essentially the most extreme vulnerabilities focus on Firefox’s JavaScript engine and reminiscence administration methods. 

CVE-2025-8027 represents a very harmful flaw the place the IonMonkey-JIT compiler solely wrote 32 bits of a 64-bit return worth to the stack on 64-bit platforms, whereas the Baseline-JIT learn your entire 64 bits. This mismatch may result in unpredictable habits and potential code execution.

One other crucial challenge, CVE-2025-8028, impacts ARM64 methods the place WebAssembly br_table directions with quite a few entries may trigger label truncation, leading to incorrect department tackle calculations. 

The replace additionally addresses a number of reminiscence security bugs tracked as CVE-2025-8044, CVE-2025-8034, CVE-2025-8040, and CVE-2025-8035, which Mozilla’s safety workforce believes could possibly be exploited for arbitrary code execution with ample effort.

Cross-Origin and Content material Safety Coverage

A number of vulnerabilities concerned circumventing essential internet safety mechanisms. CVE-2025-8036 allowed attackers to bypass Cross-Origin Useful resource Sharing (CORS) protections via DNS rebinding assaults, as Firefox cached CORS preflight responses throughout IP tackle modifications. 

The browser additionally suffered from Content material Safety Coverage (CSP) bypass points, together with CVE-2025-8032 the place XSLT doc loading didn’t propagate supply doc CSP restrictions.

Authentication credentials confronted publicity danger via CVE-2025-8031, the place username:password mixtures weren’t correctly stripped from URLs in CSP stories, doubtlessly leaking HTTP Fundamental Authentication credentials.

Moreover, CVE-2025-8029 enabled execution of javascript: URLs when embedded in object and embed tags, creating one other assault vector.

CVETitleImpactCVE-2025-8027JavaScript engine solely wrote partial return worth to stackHighCVE-2025-8028Large department desk may result in truncated instructionHighCVE-2025-8044Memory security bugs fastened in Firefox 141 and Thunderbird 141HighCVE-2025-8034Memory security bugs fastened in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141HighCVE-2025-8040Memory security bugs fastened in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141HighCVE-2025-8035Memory security bugs fastened in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141HighCVE-2025-8041Incorrect URL truncation in Firefox for AndroidModerateCVE-2025-8042Sandboxed iframe may begin downloadsModerateCVE-2025-8029javascript: URLs executed on object and embed tagsModerateCVE-2025-8036DNS rebinding circumvents CORSModerateCVE-2025-8037Nameless cookies shadow safe cookiesModerateCVE-2025-8030Potential user-assisted code execution in “Copy as cURL” commandModerateCVE-2025-8043Incorrect URL truncationModerateCVE-2025-8031Incorrect URL stripping in CSP reportsModerateCVE-2025-8032XSLT paperwork may bypass CSPModerateCVE-2025-8038CSP frame-src was not appropriately enforced for pathsLowCVE-2025-8039Search phrases endured in URL barLowCVE-2025-8033Incorrect JavaScript state machine for generatorsLow

Android Fixes

Firefox for Android obtained particular consideration with fixes for CVE-2025-8041 and CVE-2025-8042. 

The primary addressed incorrect URL truncation within the tackle bar, the place URLs had been shortened from the top fairly than prioritizing the origin show. 

The second vulnerability allowed sandboxed iframes with out the allow-downloads attribute to provoke downloads, breaking the meant safety sandbox.

The replace additionally resolves cookie shadowing points via CVE-2025-8037, the place anonymous cookies with equal indicators may shadow safe cookies even when set over unencrypted HTTP connections. 

Mozilla strongly recommends all Firefox customers replace instantly to model 141 to guard towards these vulnerabilities, which vary from high-impact reminiscence corruption points to reasonable privateness and safety bypasses.

Enhance detection, scale back alert fatigue, speed up response; all with an interactive sandbox constructed for safety groups -> Strive ANY.RUN Now 

Cyber Security News Tags:Firefox, Fix, Multiple, Released, Vulnerabilities

Post navigation

Previous Post: Critical Vulnerabilities Patched in Sophos Firewall
Next Post: A New Approach to a Decade-Old Challenge

Related Posts

AI Red Teaming Tool “Red AI Range” Discovers, Analyze, and Mitigate  Vulnerabilities Cyber Security News
New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands Cyber Security News
Quid Miner Launches Mobile App to Unlock in Daily Cloud Mining Income for BTC, DOGE, and XRP for Investors Cyber Security News
PoC Exploit Released for Fortinet 0-Day Vulnerability that Allows Remote Code Execution Cyber Security News
US Confirms Shutdown of BlackSuit Ransomware That Hacked Over 450 Organizations Cyber Security News
Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vidar Stealer Bypassing Browser Security Via Direct Memory Injection to Steal Login Credentials
  • Threat Actors With Stealer Malwares Processing Millions of Credentials a Day
  • New Rust-Based ChaosBot Malware Leverages Discord for Stealthy Command and Control
  • Salt Typhoon Using Zero-Day Exploits and DLL Sideloading Techniques to Attack Organizations
  • Microsoft Enhances Windows Security by Turning Off File Previews for Downloads

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News