A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1979536 | Issue Tracking Permissions Required |
| https://www.mozilla.org/security/advisories/mfsa2025-81/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-83/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-84/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-85/ | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/10/msg00015.html | |
| https://lists.debian.org/debian-lts-announce/2025/10/msg00031.html |
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-10-14 13:15
Updated : 2025-11-03 18:15
NVD link : CVE-2025-11712
Mitre link : CVE-2025-11712
CVE.ORG link : CVE-2025-11712
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
CWE
CWE-116
Improper Encoding or Escaping of Output
