A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1866661 | issue tracking |
https://www.mozilla.org/security/advisories/mfsa2025-14/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-16/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-17/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-18/ | vendor advisory |