A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1866661 | Issue Tracking |
| https://www.mozilla.org/security/advisories/mfsa2025-14/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-16/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-17/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-18/ | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2025/03/msg00006.html |
Configurations
Configuration 1 (hide)
|
History
03 Nov 2025, 21:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-03-04 14:15
Updated : 2025-11-03 21:18
NVD link : CVE-2025-1935
Mitre link : CVE-2025-1935
CVE.ORG link : CVE-2025-1935
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
