CVE-2025-0237

EUVD-2025-1569
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
mozillafirefox_esr
𝑥
< 128.6.0
mozillafirefox
𝑥
< 134.0
mozillathunderbird
𝑥
< 128.6.0
mozillathunderbird
129.0 ≤
𝑥
< 134.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firefox
sid
149.0.2-1
fixed
firefox-esr
bookworm
128.14.0esr-1~deb12u1
fixed
bookworm (security)
140.9.1esr-1~deb12u1
fixed
bullseye
vulnerable
bullseye (security)
140.9.1esr-1~deb11u1
fixed
forky
140.9.1esr-1
fixed
sid
140.9.1esr-1
fixed
trixie
140.8.0esr-1~deb13u1
fixed
trixie (security)
140.9.1esr-1~deb13u1
fixed
thunderbird
bookworm
1:140.6.0esr-1~deb12u1
fixed
bookworm (security)
1:140.9.1esr-1~deb12u1
fixed
bullseye
vulnerable
bullseye (security)
1:140.9.1esr-1~deb11u1
fixed
forky
1:140.9.0esr-1
fixed
sid
1:140.9.1esr-1
fixed
trixie
1:140.8.0esr-1~deb13u1
fixed
trixie (security)
1:140.9.1esr-1~deb13u1
fixed