
During the Pwn2Own Berlin 2025 competition—a renowned event where top security researchers demonstrate zero-day exploits—two significant vulnerabilities in Mozilla Firefox were successfully leveraged. These zero-days, CVE-2025-4918 and CVE-2025-4919, prompted Mozilla to issue an immediate patch, highlighting both the agility of Mozilla’s security team and the evolving sophistication of browser-based threats.
Detailed Vulnerability Breakdown
1. CVE-2025-4918 – Out-of-Bounds Read/Write in JavaScript Engine
- Discovered by: Edouard Bochin and Tao Yan from Palo Alto Networks.
- Technical Summary:
- The flaw exists within Firefox’s JavaScript engine and relates to the mishandling of
Promiseobject resolution. - Specifically, the vulnerability is tied to improper memory access—an out-of-bounds (OOB) read/write condition.
- The flaw exists within Firefox’s JavaScript engine and relates to the mishandling of
- Impact:
- Exploiting this bug allows attackers to read or write memory outside the intended buffer, which can lead to remote code execution (RCE).
- It compromises the content process of the browser, although the exploit did not breach the sandbox.
- Security Context:
- OOB vulnerabilities are dangerous because they can be used to alter program execution paths, enabling full control over the application.
2. CVE-2025-4919 – Index Confusion in Array Optimization
- Discovered by: Manfred Paul
- Technical Summary:
- This vulnerability is caused by a size confusion bug in the JavaScript JIT (Just-In-Time) compiler’s optimization of linear sums in array indexes.
- Essentially, during performance optimizations, Firefox incorrectly interprets array boundaries, allowing access to unauthorized memory.
- Impact:
- An attacker can use this to manipulate memory in unintended ways, ultimately gaining execution capabilities within the browser context.
Security Response: Mozilla’s Swift Action
In an impressive demonstration of responsible security response, Mozilla released a security patch just hours after the vulnerabilities were presented at the competition. This swift action helped neutralize the risks before threat actors could exploit them in the wild.
Affected Products & Patched Versions:
- Firefox (Stable) – v138.0.4
- Firefox ESR (Extended Support Release) – v128.10.1 and v115.23.1
- Firefox for Android – Patched in the latest mobile update
Sandbox Success: Mitigation at Work
While both vulnerabilities were serious, neither was able to escape Firefox’s sandbox—a critical containment mechanism that limits what code can do even if it is executed. Mozilla credited recent improvements in sandbox architecture and process isolation for preventing the attackers from gaining higher privileges on the host machine.
Why this matters: A sandbox bypass would have allowed the attackers to execute code with system-level privileges—turning a browser bug into a full system compromise. That didn’t happen here, which is a testament to Mozilla’s defensive layers.
Recommended Immediate Actions for Users and Admins
- Update Firefox Immediately
- Manually check for updates or ensure auto-update is enabled across all endpoints.
- Audit Browser Usage Policies
- For enterprise environments, consider restricting JavaScript or plugin execution where not needed.
- Enable Enhanced Tracking Protection (ETP)
- Firefox’s built-in ETP blocks known tracking scripts and exploits.
- Monitor for Unusual Browser Behavior
- In security operations (SOC), add rules to detect memory anomalies or remote code execution attempts within browser sessions.
Final Note
Mozilla’s quick action in response to the Pwn2Own 2025 exploits demonstrates the modern need for agility in security operations. As threat actors increasingly target client-side applications like web browsers, real-time threat intelligence, immediate patch management, and layered defenses, they are more critical than ever.


