CVE-2025-0237
WebChannel APIs susceptible to confused deputy attack
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | Jan 7, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new medium vulnerabilities affecting mozilla firefox are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1915257 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-01/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-02/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-04/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-05/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00004.html
Credits
Andrew McCreight