CVE-2025-3028
Use-after-free triggered by XSLTProcessor
CVSS Score
6.5
EPSS Score
0.0%
EPSS Percentile
0th
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability was fixed in Firefox 137, Firefox ESR 115.22, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 1, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new medium vulnerabilities affecting mozilla firefox are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1941002 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-20/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-21/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-22/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-23/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-24/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/04/msg00005.html
Credits
Ivan Fratric of Google Project Zero