Impact
A use‑after‑free flaw was found in the XSLT processing engine, allowing an attacker to supply crafted XSLT data that leads to a crash. The flaw is marked as CWE‑416 and could potentially be leveraged to achieve arbitrary code execution, compromising system confidentiality and integrity.
Affected Systems
Mozilla Firefox versions prior to 135, including Firefox ESR 115.20 and 128.7, and all Mozilla Thunderbird releases before 128.7 and 135 are affected. The same flaw may impact Red Hat Enterprise Linux deriving from packages that embed the vulnerable libraries, as indicated by several Red Hat CPE entries.
Risk and Exploitability
The CVSS score of 9.8 indicates critical severity, and the EPSS score of less than 1% implies low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers are likely to trigger the flaw by delivering a malicious XSLT file or URL that is processed by the victim’s browser or email client, making the most probable vector user interaction with crafted content.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN