CVE-2025-11713
Potential user-assisted code execution in “Copy as cURL” command
CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th
Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 14, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new high vulnerabilities affecting mozilla firefox are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1986142 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-81/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-83/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-84/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-85/
Credits
Hafiizh & kang ali