CVE-2025-1934Incorrect Regular Expression in Mozilla Firefox

Severity
6.5MEDIUMNVD
OSV7.5
EPSS
0.3%
top 48.22%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateJul 22

Description

It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

NVDmozilla/firefox< 128.8.0+1
NVDmozilla/thunderbird129.0136.0+1
Ubuntumozilla/firefox< 136.0+build3-0ubuntu0.20.04.1
Debianmozilla/thunderbird< 1:128.8.0esr-1~deb11u1+3

🔴Vulnerability Details

4
OSV
firefox vulnerabilities2025-03-06
CVEList
Unexpected GC during RegExp bailout processing2025-03-04
OSV
CVE-2025-1934: It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engi2025-03-04
GHSA
GHSA-8454-mw8r-4mjq: It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engi2025-03-04

📋Vendor Advisories

8
Ubuntu
Thunderbird vulnerabilities2025-07-22
Ubuntu
Firefox vulnerabilities2025-03-06
Red Hat
firefox: Unexpected GC during RegExp bailout processing2025-03-04
Debian
CVE-2025-1934: firefox - It was possible to interrupt the processing of a RegExp bailout and run addition...2025
Mozilla
Mozilla Foundation Security Advisory 2025-14: CVE-2025-1934
CVE-2025-1934 — Incorrect Regular Expression in Mozilla | cvebase