CVE-2025-8031
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2026-04-13

Assigner: Mozilla Corporation

Description
The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2025-07-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 6 associated CPEs
Vendor Product Version / Range
mozilla firefox From 60.9.0 (exc)
mozilla thunderbird to 140.0 (inc)
mozilla thunderbird to 140.0 (inc)
mozilla thunderbird to 140.0 (inc)
mozilla firefox From 60.9.0 (exc)
mozilla firefox From 60.9.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-276 During installation, installed file permissions are set to allow anyone to modify those files.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs because the username and password portion of URLs were not properly removed from Content Security Policy (CSP) reports. As a result, HTTP Basic Authentication credentials could be unintentionally exposed in these reports.


How can this vulnerability impact me? :

If exploited, this vulnerability could lead to the leakage of HTTP Basic Authentication credentials, potentially allowing unauthorized access to protected resources or accounts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart