When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `<embed>` or `<object>` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1971140 | Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2025-51/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-53/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2025-54/ | |
https://www.mozilla.org/security/advisories/mfsa2025-55/ |
Configurations
Configuration 1 (hide)
|
History
14 Jul 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 13:15
Updated : 2025-07-14 19:15
NVD link : CVE-2025-6430
Mitre link : CVE-2025-6430
CVE.ORG link : CVE-2025-6430
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')