CVE-2025-55031
BaseFortify
Publication date: 2025-08-19
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | firefox_focus | From 60.9.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-601 | The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves malicious web pages using Firefox for iOS to interact with the operating system and trigger the hybrid passkey transport via FIDO. An attacker within Bluetooth range could exploit this to trick a user into using their passkey, allowing the attacker to log into the user's account on the attacker's computer.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker nearby (within Bluetooth range) to gain unauthorized access to your accounts by tricking you into using your passkey, potentially compromising your personal or sensitive information.