Description
Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability was fixed in Firefox 144.0.2.
Published: 2025-10-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Use-after-free leading to potential child sandbox escape
Action: Immediate Patch
AI Analysis

Impact

A compromised child process can trigger a use‑after‑free in Firefox’s GPU or browser process through WebGPU IPC calls, allowing the attacker to potentially escape the child process sandbox. The flaw stems from improper deallocation of GPU resource handles (CWE‑416) and can lead to execution of arbitrary code or data disclosure within the host process.

Affected Systems

All Firefox installations starting with version 142 up to 144.0.1 on any platform are affected. The vulnerability was resolved in Firefox 144.0.2 and later releases.

Risk and Exploitability

The CVSS score of 9.8 indicates critical severity, but the EPSS score of less than 1% suggests a very low likelihood of active exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitability requires a child process to be compromised and to send malicious WebGPU IPC messages; no public exploitation reports exist yet, so the primary threat is theoretical until an adversary finds a vector to compromise a child process.

Generated by OpenCVE AI on April 20, 2026 at 19:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all Firefox installations to version 144.0.2 or later to remove the use‑after‑free flaw.
  • Temporarily disable WebGPU by setting the dom.webgpu.enabled preference to false in the Firefox configuration until the software patch is applied.
  • Enable system‑level monitoring of child processes and IPC calls to detect anomalous WebGPU activity, and implement alerts for suspicious behavior.

Generated by OpenCVE AI on April 20, 2026 at 19:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability affects Firefox < 144.0.2. Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability was fixed in Firefox 144.0.2.

Fri, 19 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*

Thu, 30 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Title Use-after-free in WebGPU internals triggered from a compromised child process

Wed, 29 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Vendors & Products Mozilla
Mozilla firefox

Tue, 28 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Description Starting with Firefox 142, it was possible for a compromised child process to trigger a use-after-free in the GPU or browser process using WebGPU-related IPC calls. This may have been usable to escape the child process sandbox. This vulnerability affects Firefox < 144.0.2.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T14:31:37.137Z

Reserved: 2025-10-28T07:05:52.674Z

Link: CVE-2025-12380

cve-icon Vulnrichment

Updated: 2025-10-29T13:53:05.089Z

cve-icon NVD

Status : Modified

Published: 2025-10-28T14:15:57.860

Modified: 2026-04-13T15:16:41.757

Link: CVE-2025-12380

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T19:15:15Z

Weaknesses