Firefox and Tor Browser Vulnerability Exposed: Hidden Tracking Risk in Private Browsing Modes

By Thomas | Published on April 26, 2026

News

A recently uncovered vulnerability in Mozilla Firefox and Tor Browser has raised serious concerns about privacy online. The flaw, found by researchers at Fingerprint, has the potential to undermine some of the core privacy features these browsers offer, including private browsing modes and the Tor network's "New Identity" feature. The issue revolves around how the browsers handle IndexedDB, a built-in browser storage system. Websites could exploit this to generate stable, persistent identifiers for users, even when they actively take steps to ensure their anonymity. Both Mozilla and Tor have acted swiftly to patch the vulnerability, but the incident highlights the ongoing challenges in maintaining privacy on the internet.

The Vulnerability Explained

The flaw centers around IndexedDB, a database used by websites to store large amounts of structured data on users' devices. It is essential for enabling offline browsing and improving web app performance. However, when a website queries this data, the order in which the browser returns it is not random. Instead, it follows an internal order that reflects the browser's internal state, which is unique to each session.

Researchers found that this order could be used to generate a "stable process-lifetime identifier" that websites could use to track users across browsing sessions. The flaw is particularly troubling because it persisted even when users were in private browsing modes or using Tor's "New Identity" feature, which is designed to protect users' privacy by clearing cookies, history, and switching Tor circuits.

Impact on Privacy Features

The vulnerability is significant because it undermines the privacy promises of both Firefox and Tor Browser. Typically, users rely on private browsing modes to avoid leaving traces of their activity on their devices. However, with this vulnerability, the stable identifier persisted across browsing sessions, even after private windows were closed in Firefox or after using the "New Identity" feature in Tor. As long as the browser process remained running, the identifier stayed the same, allowing websites to link activities across different sessions.

For Tor users, this flaw was especially concerning. Tor’s primary design goal is to minimize cross-site linkability and prevent any form of identity tracking. This bug cut directly against that goal, making it easier for websites to track users, even when they tried to reset their session or use a new Tor circuit.

The Discovery and Response

Security researchers Dai Nguyen and Martin Bajanik from Fingerprint were the first to uncover the issue. They published a detailed report explaining the vulnerability and its implications. The researchers emphasized that while the flaw could be used for tracking, it wasn’t based on the traditional methods like cookies, making it harder to detect and mitigate.

After Fingerprint responsibly disclosed the vulnerability to both Mozilla and the Tor Project, both organizations moved quickly to release patches. Mozilla addressed the issue in Firefox version 150, which was made available shortly after the report was released. Tor Browser, which is built on Firefox, included the same fix in version 15.0.10, ensuring that both browsers were secured against the exploit.

Conclusion

The flaw discovered in Firefox and Tor Browser serves as a reminder of the continuous challenges in maintaining online privacy. Despite the significant efforts made by both Mozilla and the Tor Project to protect users, vulnerabilities like this show how difficult it is to guarantee privacy in today’s digital landscape. While patches have already been issued, users who care about their anonymity should make sure to update their browsers to the latest versions. The incident also raises broader questions about how we think of privacy in the digital age, where even privacy-focused tools can be susceptible to unexpected vulnerabilities.

Similar Articles

0 Comments

No comments yet. Be the first one to comment!