Impact
A breach of the Storage Access API lets malicious webpages redirect a logged‑in user’s browser to arbitrary URLs, causing the browser to perform credentialed requests on behalf of the user. The flaw originates when a site uses the Storage Access API redirects to force the browser to send requests to any domain the user has visited. This is a form of Cross‑Site Request Forgery (CWE‑352) that could lead to unauthorized actions or data disclosure, damaging confidentiality, integrity, and potentially availability of the user’s accounts.
Affected Systems
The flaw affects all Mozilla Firefox and Mozilla Thunderbird releases prior to version 138. This inference is based on the vendor’s fix dates; the vulnerability was fixed in Firefox 138 and Thunderbird 138, implying earlier versions were vulnerable until then.
Risk and Exploitability
The CVSS score of 6.5 indicates medium severity, but the EPSS score of less than 1% signals a very low probability of exploitation at present, and the weakness is not listed in the CISA KEV catalog. The attack requires a user to visit a malicious site that performs a redirect; by exploiting the Storage Access API it can send requests to any domain the user has visited. The impact remains that any authenticated web service the user is logged into could be misused if the victim follows the redirect.
OpenCVE Enrichment
EUVD
Ubuntu USN