CVE-2025-0237

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
mozillaCNA
---
---
CISA-ADPADP
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
mozillafirefox
𝑥
< 128.6.0
mozillafirefox
𝑥
< 134.0
mozillathunderbird
𝑥
< 128.6.0
mozillathunderbird
129.0 ≤
𝑥
< 134.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firefox
sid
139.0-1
fixed
firefox-esr
bullseye
vulnerable
bullseye (security)
128.11.0esr-1~deb11u1
fixed
bookworm
128.10.0esr-1~deb12u1
fixed
bookworm (security)
128.11.0esr-1~deb12u1
fixed
sid
128.11.0esr-1
fixed
trixie
128.11.0esr-1
fixed
thunderbird
bullseye
vulnerable
bullseye (security)
1:128.11.0esr-1~deb11u1
fixed
bookworm
1:128.10.0esr-1~deb12u1
fixed
bookworm (security)
1:128.11.0esr-1~deb12u1
fixed
trixie
1:128.10.0esr-1
fixed
sid
1:128.11.0esr-1
fixed