CVE-2025-6430
Content-Disposition header ignored when a file is included in an embed or object tag
CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th
When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `<embed>` or `<object>` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | Jun 24, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new medium vulnerabilities affecting mozilla firefox are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1971140 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-51/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-53/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-54/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-55/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/07/msg00002.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/06/msg00029.html
Credits
Daniil Satyaev (Positive Technologies)