CVE-2025-14331
BaseFortify
Publication date: 2025-12-09
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | to 115.31.0 (exc) |
| mozilla | firefox | to 146.0 (exc) |
| mozilla | firefox | From 116.0 (inc) to 140.6.0 (exc) |
| mozilla | thunderbird | to 140.6.0 (exc) |
| mozilla | thunderbird | to 146.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-346 | The product does not properly verify that the source of data or communication is valid. |
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Firefox to version 146 or later, or Firefox ESR to version 115.31 or later, or Firefox ESR to version 140.6 or later, as these versions include fixes for the same-origin policy bypass in the Request Handling component. [3]
Can you explain this vulnerability to me?
This vulnerability is a same-origin policy bypass in the Request Handling component of Firefox browsers. It affects versions of Firefox earlier than 146 and Firefox ESR versions earlier than 115.31 and 140.6. The same-origin policy is a security measure that restricts how documents or scripts loaded from one origin can interact with resources from another origin. Bypassing this policy can allow unauthorized access to data or actions across different origins.
How can this vulnerability impact me? :
By bypassing the same-origin policy, this vulnerability could allow malicious websites or scripts to access or manipulate data from other websites without proper authorization. This can lead to data theft, unauthorized actions, or compromise of user privacy and security when using affected versions of Firefox.