We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-0237



Description

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.

Reserved 2025-01-06 | Published 2025-01-07 | Updated 2025-01-13 | Assigner mozilla

Problem types

WebChannel APIs susceptible to confused deputy attack

Product status

Any version before 134
affected

Any version before 128.6
affected

Any version before 134
affected

Any version before 128.6
affected

Credits

Andrew McCreight

References

bugzilla.mozilla.org/show_bug.cgi?id=1915257

www.mozilla.org/security/advisories/mfsa2025-01/

www.mozilla.org/security/advisories/mfsa2025-02/

www.mozilla.org/security/advisories/mfsa2025-04/

www.mozilla.org/security/advisories/mfsa2025-05/

cve.org (CVE-2025-0237)

nvd.nist.gov (CVE-2025-0237)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-0237

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.