Impact
The vulnerability stems from the WebChannel API not validating the sending principal before accepting it, allowing a process to impersonate another and gain elevated privileges. This flaw classifies as a confused‑deputy attack and is mapped to CWE‑441 and CWE‑863. An attacker could exploit the flaw to broaden the access scope of a less privileged process, potentially compromising confidential data or enabling further attacks.
Affected Systems
Mozilla Firefox, including ESR releases, and Mozilla Thunderbird are affected when running versions prior to Firefox 134 / ESR 128.6 and Thunderbird 134 / ESR 128.6. The issue appears in installations on various operating systems, as indicated by the Red Hat Enterprise Linux CPE entries, but the fix applies to all supported platforms.
Risk and Exploitability
The CVSS score of 5.4 suggests moderate severity while the EPSS score of < 1 % reflects a low likelihood of exploitation at present. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation would involve sending malicious messages through the WebChannel API to a target process, a scenario that typically requires local user interaction or an existing compromise of the sending process.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN