The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1915257 | Issue Tracking Permissions Required | 
| https://www.mozilla.org/security/advisories/mfsa2025-01/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-02/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-04/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-05/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    03 Apr 2025, 16:29
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time | Mozilla Mozilla firefox Mozilla thunderbird | |
| CPE | cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | |
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1915257 - Issue Tracking, Permissions Required | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-01/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-02/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-04/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-05/ - Vendor Advisory | 
13 Jan 2025, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6. | 
09 Jan 2025, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. | |
| References | 
 | 
08 Jan 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-863 | |
| Summary | 
 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 5.4 | 
07 Jan 2025, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-01-07 16:15
Updated : 2025-04-03 16:29
NVD link : CVE-2025-0237
Mitre link : CVE-2025-0237
CVE.ORG link : CVE-2025-0237
JSON object : View
Products Affected
                mozilla
- firefox
- thunderbird
CWE
                
                    
                        
                        CWE-863
                        
            Incorrect Authorization
