CVE-2025-0237

NameCVE-2025-0237
DescriptionThe WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5839-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
firefox (PTS)sid134.0-1fixed
firefox-esr (PTS)bullseye115.14.0esr-1~deb11u1vulnerable
bullseye (security)128.5.0esr-1~deb11u1vulnerable
bookworm128.3.1esr-1~deb12u1vulnerable
bookworm (security)128.6.0esr-1~deb12u1fixed
trixie128.5.0esr-1vulnerable
sid128.6.0esr-1fixed
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1vulnerable
bullseye (security)1:128.5.0esr-1~deb11u1vulnerable
bookworm1:115.16.0esr-1~deb12u1vulnerable
bookworm (security)1:128.5.0esr-1~deb12u1vulnerable
trixie1:128.5.2esr-1vulnerable
sid1:128.6.0esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
firefoxsource(unstable)134.0-1
firefox-esrsourcebookworm128.6.0esr-1~deb12u1DSA-5839-1
firefox-esrsource(unstable)128.6.0esr-1
thunderbirdsource(unstable)1:128.6.0esr-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0237
https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0237
https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0237

Search for package or bug name: Reporting problems