CVE-2025-5264
Potential local code execution in “Copy as cURL” command
CVSS Score
4.8
EPSS Score
0.0%
EPSS Percentile
0th
Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | May 27, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new medium vulnerabilities affecting mozilla firefox are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1950001 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-42/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-43/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-44/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-45/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-46/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00046.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00043.html
Credits
Ameen Basha M K