VYPR
High severity7.6NVD Advisory· Published Mar 4, 2025· Updated Apr 13, 2026

CVE-2025-1933

CVE-2025-1933

Description

On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

On 64-bit CPUs, Firefox's JIT compiler could leave residual high bits in WASM i32 return values, potentially changing their type and leading to memory corruption or crashes.

Vulnerability

Details

CVE-2025-1933 is a high-severity issue in Firefox's just-in-time (JIT) compiler when handling WebAssembly (WASM) i32 return values on 64-bit CPUs. Due to an optimization flaw, the JIT may fail to clear upper bits of the CPU registers holding the return value, allowing stale memory bits to persist. This can cause the returned 32-bit integer to be interpreted as a different type, leading to type confusion or memory corruption [1][2].

Exploitation

Prerequisites

No authentication is required to trigger the vulnerability; a remote attacker would need to convince a user to visit a malicious page containing crafted WASM code. The bug is triggered during JIT compilation of WASM functions that return i32 values. Exploitation does not require user interaction beyond normal browsing and is reproducible with a proof-of-concept script [1].

Impact

An attacker can leverage this type confusion to read or write memory in the browser process, potentially leading to arbitrary code execution or a crash. The vulnerability is rated high (CVSS 7.6) and could be used in a chain with other bugs to achieve sandbox escape [1][2].

Mitigation

Mozilla has fixed this issue in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8. Users should update to the latest versions. No workarounds are available [2][3][4].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

30

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.