CVE-2025-14327
BaseFortify
Publication date: 2025-12-09
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | to 146.0 (exc) |
| mozilla | thunderbird | to 146.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a spoofing issue in the Downloads Panel component of Firefox versions prior to 146. It allows an attacker to potentially deceive users by presenting misleading information in the Downloads Panel.
How can this vulnerability impact me? :
The impact of this vulnerability could include users being tricked into trusting malicious downloads or misinterpreting the status of their downloads, which may lead to security risks such as executing harmful files.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Firefox to version 146 or later, as the issue affects Firefox versions prior to 146.