Impact
A JavaScript module that contains JSON can trigger a cross‑compartment access flaw, which may cause a use‑after‑free in the parser. The flaw originates from an improper compartment mismatch handling and is classified as CWE‑416. The effect listed in the CVSS score of 4 indicates that the primary consequence is a program crash or unexpected memory corruption, rather than a direct remote code execution.
Affected Systems
The vulnerability affects Mozilla products, namely Firefox and Thunderbird. The security advisory states that the issue has been fixed in Firefox 134 and Firefox ESR 128.6, as well as in Thunderbird 134 and Thunderbird 128.6. No specific version list is supplied beyond the patched releases.
Risk and Exploitability
The EPSS score of less than 1% suggests a very low probability of exploitation, and the vulnerability is not currently listed in CISA’s KEV catalog. The CVSS score of 4 classifies it as low severity. Likely the attack vector requires a crafted JavaScript module delivered to the affected browser, so local or compromised conditions are implied. Because of the low score and limited exploitation probability, the overall risk is considered low, but the use‑after‑free can still be leveraged to crash the browser or potentially corrupt memory if combined with other weaknesses.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN