CVE-2025-1933
NixOS vulnerability analysis and mitigation

Overview

CVE-2025-1933 is a high-impact vulnerability discovered in Mozilla's JavaScript Just-In-Time (JIT) compiler affecting the handling of WebAssembly (WASM) i32 return values on 64-bit CPUs. The vulnerability was disclosed on March 4, 2025, and affects multiple Mozilla products including Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8 (Mozilla Advisory).

Technical details

The vulnerability occurs when the JIT compiler processes WASM i32 return values on 64-bit CPU architectures. The technical issue involves leftover memory bits being picked up during compilation, which can potentially cause these values to be treated as a different type than intended. This type confusion vulnerability was discovered by Xiangwei Zhang and kkdong of Tencent Security YUNDING LAB (Mozilla Advisory).

Impact

The vulnerability has been classified as high impact. When exploited, it could lead to type confusion issues where values are interpreted incorrectly, potentially resulting in memory corruption. This could potentially be leveraged for arbitrary code execution in affected applications (Mozilla Advisory).

Mitigation and workarounds

Mozilla has addressed this vulnerability in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8. Users are strongly advised to update to these latest versions to mitigate the security risk (Mozilla Advisory, Ubuntu Security).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management