Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
https://www.infosecurity-magazine.com/news/chrome-zero-day-flaw-exploited/
https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/
https://www.theregister.com/2025/03/28/google_kaspersky_mozilla/
https://therecord.media/firefox-sandbox-vulnerability-similar-chrome-zero-day
https://thehackernews.com/2025/03/mozilla-patches-critical-firefox-bug.html