CVE-2025-2857
CRITICAL EXPLOITEDMozilla Firefox < 136.0.4 - Exposure to Wrong Actor
Title source: ruleDescription
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability was fixed in Firefox 136.0.4, Firefox ESR 128.8.1, and Firefox ESR 115.21.1.
Exploits (1)
github
SUSPICIOUS
13 stars
by Leviticus-Triage · pythonpoc
https://github.com/Leviticus-Triage/ChromSploit-Framework
References (4)
Scores
CVSS v3
10.0
EPSS
0.0017
EPSS Percentile
38.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2026-01-20
CWE
CWE-668
Status
published
Products (5)
mozilla/firefox
< 115.21.1
mozilla/firefox
< 136.0.4
Mozilla/Firefox
115.21.1 - 115.*
Mozilla/Firefox
128.8.1 - 128.*
Mozilla/Firefox
136.0.4
Published
Mar 27, 2025
Tracked Since
Feb 18, 2026