Description
An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability was fixed in Firefox 140, Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
Published: 2025-06-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure
Action: Update Browser
AI Analysis

Impact

The flaw in the WebCompat extension allows an attacker who enumerates its resource files to retrieve a UUID that is unique to the browser installation. This identifier remains the same across normal and private browsing modes as well as container instances, enabling continued tracking of the same browser even when the user switches profiles. Because the UUID persists at the browser level, the attacker can link multiple browsing sessions to a single user without requiring any active user involvement. This weakness is an information disclosure scenario, matching CWE-200.

Affected Systems

Mozilla Firefox versions older than 140, including all ESR releases prior to 115.25 and 128.12, as well as Mozilla Thunderbird versions older than 140, including ESR 128.12. The vulnerability also affects systems that ship bundled packages of these browsers, such as Red Hat Enterprise Linux 8, 9, 10, and their variations, where the extension is preinstalled. Any device running one of these affected browsers is at risk unless the browser has been updated to a patched release.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate impact, and the EPSS score of less than 1% suggests a low likelihood of exploitation at the time of this analysis. It is not listed in CISA’s KEV catalog, which further reduces the perceived threat level. Attackers would need to identify the extension’s resources (a local or web-based enumeration step) and then read the UUID, after which they could use it to persistently identify the user across browsing contexts. No known public exploits have been reported, but the persistence nature of the data provides potentially significant privacy concerns.

Generated by OpenCVE AI on April 20, 2026 at 18:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Firefox 140, Firefox ESR 115.25 or newer, or Firefox ESR 128.12, and to Thunderbird 140 or Thunderbird ESR 128.12, which contain the fix.
  • If the upgrade cannot be performed immediately, disable or remove the WebCompat extension to prevent UUID extraction.
  • Monitor for any tracking or data collection that could use the UUID; review browser logs for suspicious external requests.

Generated by OpenCVE AI on April 20, 2026 at 18:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4231-1 firefox-esr security update
Debian DLA Debian DLA DLA-4239-1 thunderbird security update
Debian DSA Debian DSA DSA-5950-1 firefox-esr security update
Debian DSA Debian DSA DSA-5959-1 thunderbird security update
EUVD EUVD EUVD-2025-19101 An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.
Ubuntu USN Ubuntu USN USN-7663-1 Thunderbird vulnerabilities
History

Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12. An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability was fixed in Firefox 140, Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.

Mon, 03 Nov 2025 20:30:00 +0000


Thu, 30 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Title firefox: thunderbird: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID The WebCompat WebExtension shipped with Firefox exposed a persistent UUID

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00037}

epss

{'score': 0.00064}


Fri, 04 Jul 2025 02:30:00 +0000

Type Values Removed Values Added
Title firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID firefox: thunderbird: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID

Thu, 03 Jul 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
Vendors & Products Mozilla
Mozilla firefox

Wed, 02 Jul 2025 20:45:00 +0000

Type Values Removed Values Added
Description An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12. An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.
References

Wed, 02 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Els
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:rhel_aus:8.2
cpe:/a:redhat:rhel_aus:8.4
cpe:/a:redhat:rhel_aus:8.6
cpe:/a:redhat:rhel_e4s:8.6
cpe:/a:redhat:rhel_e4s:8.8
cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_e4s:9.2
cpe:/a:redhat:rhel_eus:9.4
cpe:/a:redhat:rhel_tus:8.6
cpe:/a:redhat:rhel_tus:8.8
cpe:/o:redhat:enterprise_linux:10.0
cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Els
Redhat rhel Eus
Redhat rhel Tus

Wed, 02 Jul 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Thu, 26 Jun 2025 02:45:00 +0000


Wed, 25 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-200
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}


Wed, 25 Jun 2025 00:30:00 +0000

Type Values Removed Values Added
Title firefox: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

threat_severity

Moderate


Tue, 24 Jun 2025 12:45:00 +0000

Type Values Removed Values Added
Description An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, and Firefox ESR < 128.12.
References

Subscriptions

Mozilla Firefox Firefox Esr
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T14:26:06.659Z

Reserved: 2025-06-20T14:51:28.050Z

Link: CVE-2025-6425

cve-icon Vulnrichment

Updated: 2025-11-03T20:07:00.354Z

cve-icon NVD

Status : Modified

Published: 2025-06-24T13:15:23.403

Modified: 2026-04-13T15:17:06.333

Link: CVE-2025-6425

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-06-24T12:27:59Z

Links: CVE-2025-6425 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T18:15:13Z

Weaknesses