The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1915257 | Issue Tracking Permissions Required |
| https://www.mozilla.org/security/advisories/mfsa2025-01/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-02/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-04/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-05/ | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/01/msg00004.html |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-01-07 16:15
Updated : 2025-11-03 23:17
NVD link : CVE-2025-0237
Mitre link : CVE-2025-0237
CVE.ORG link : CVE-2025-0237
JSON object : View
Products Affected
mozilla
- firefox
- thunderbird
CWE
CWE-863
Incorrect Authorization
