๐Ÿ” CVE Alert

CVE-2025-0237

MEDIUM 5.4

WebChannel APIs susceptible to confused deputy attack

CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability was fixed in Firefox 134, Firefox ESR 128.6, Thunderbird 134, and Thunderbird 128.6.

Vendor mozilla
Product firefox
Ecosystems
Industries
Technology
Published Jan 7, 2025
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mozilla firefox

Be the first to know when new medium vulnerabilities affecting mozilla firefox are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Mozilla / Firefox
All versions affected
Mozilla / Thunderbird
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1915257 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-01/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-02/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-04/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-05/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/01/msg00004.html

Credits

Andrew McCreight