CVE-2025-11713
BaseFortify
Publication date: 2025-10-14
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | thunderbird | to 140.0 (inc) |
| mozilla | thunderbird | to 140.0 (inc) |
| mozilla | firefox | From 60.9.0 (exc) |
| mozilla | firefox | From 60.9.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-116 | The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is due to insufficient escaping in the "Copy as cURL" feature in Firefox and Thunderbird on Windows. It could trick a user into executing unexpected code, potentially leading to unintended code execution. It affects Firefox versions below 144 and Thunderbird versions below 144, specifically on Windows.
How can this vulnerability impact me? :
The vulnerability can lead to execution of unexpected code on a Windows system if a user is tricked via the "Copy as cURL" feature. This could result in unauthorized actions or compromise of the affected application, potentially allowing attackers to run malicious code.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Firefox to version 144 or later, and Thunderbird to version 140.4 or later, as these versions contain the fixes for the insufficient escaping issue in the 'Copy as cURL' feature.