Impact
An attacker could trigger a use‑after‑free through the Custom Highlight API, which may cause the application to crash. The advisory notes only a potentially exploitable crash, indicating that the primary impact is a loss of availability.
Affected Systems
This flaw affects Mozilla Firefox and Mozilla Thunderbird. Versions earlier than Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135 are vulnerable. The issue is present across all operating systems that host these products, including the Red Hat Enterprise Linux 8, 9, and various maintenance branches listed in the CPE set.
Risk and Exploitability
The CVSS score of 9.8 classifies this weakness as critical, and the EPSS score of less than 1% indicates a low likelihood of immediate exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is via a malicious script, extension, or other user action that triggers the Custom Highlight API, causing the freed memory block to be accessed again. Exact exploitation conditions are not detailed in the advisory, but the severity remains high due to the potential for application crash.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN