Firefox executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1928021 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2025-56/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-58/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-59/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-61/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-62/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-63/ | vendor advisory |