There is an interesting thread about this.
(Varying opinions of Whonix contributors)
While it would work on a vulnerable Tor Browser in Whonix
This means that it could compromise the machine, but not leak your IP without exploit chaining.
Realistically: