Description
When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `<embed>` or `<object>` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
Published: 2025-06-24
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

When a file download is specified via a Content‑Disposition header, the header is ignored if the file is included in an embed or object tag. This oversight allows an attacker to inject malicious script into the page, leading to cross‑site scripting. The weakness is a form of script injection, identified as CWE‑79, where user‑supplied header data is processed without proper sanitization.

Affected Systems

Mozilla Firefox versions prior to 140 and Firefox ESR 128.12, and Mozilla Thunderbird versions prior to 140 and Thunderbird ESR 128.12 are affected. The vulnerability may impact systems running these browsers, including installations on Red Hat Enterprise Linux 8, 9 and related extended roll‑up streams, as indicated by the CPE references. All affected browser instances should be evaluated for presence of the fault.

Risk and Exploitability

The CVSS score of 6.1 signals moderate severity. The EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed widespread attacks yet. Exploitation requires controlled web content that includes a downloadable file via embed or object tags, typically on sites that serve user‑uploaded media. An attacker with a malicious page or ability to influence webpage code could trigger the flaw to execute injected scripts in the victim’s browser session.

Generated by OpenCVE AI on April 20, 2026 at 16:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mozilla Firefox to version 140 or later, or Firefox ESR 128.12 or newer.
  • Upgrade Mozilla Thunderbird to version 140 or later, or Thunderbird ESR 128.12 or newer.
  • If updates are unavailable, review web applications to avoid embedding downloadable content through <embed> or <object> tags that rely on the Content‑Disposition header. Remove or replace such tags with safer alternatives or ensure the header is not used for content delivered in this manner.

Generated by OpenCVE AI on April 20, 2026 at 16:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4231-1 firefox-esr security update
Debian DLA Debian DLA DLA-4239-1 thunderbird security update
Debian DSA Debian DSA DSA-5950-1 firefox-esr security update
Debian DSA Debian DSA DSA-5959-1 thunderbird security update
EUVD EUVD EUVD-2025-21377 When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.
Ubuntu USN Ubuntu USN USN-7663-1 Thunderbird vulnerabilities
History

Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12. When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.

Mon, 03 Nov 2025 20:30:00 +0000


Thu, 30 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Title firefox: thunderbird: Content-Disposition header ignored when a file is included in an embed or object tag Content-Disposition header ignored when a file is included in an embed or object tag

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00037}

epss

{'score': 0.00064}


Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00032}

epss

{'score': 0.00037}


Mon, 14 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
Description When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140 and Firefox ESR < 128.12. When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.
References

Fri, 04 Jul 2025 02:30:00 +0000

Type Values Removed Values Added
Title firefox: Content-Disposition header ignored when a file is included in an embed or object tag firefox: thunderbird: Content-Disposition header ignored when a file is included in an embed or object tag

Thu, 03 Jul 2025 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
Vendors & Products Mozilla
Mozilla firefox

Wed, 02 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Els
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:enterprise_linux:9
cpe:/a:redhat:rhel_aus:8.2
cpe:/a:redhat:rhel_aus:8.4
cpe:/a:redhat:rhel_aus:8.6
cpe:/a:redhat:rhel_e4s:8.6
cpe:/a:redhat:rhel_e4s:8.8
cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_e4s:9.2
cpe:/a:redhat:rhel_eus:9.4
cpe:/a:redhat:rhel_tus:8.6
cpe:/a:redhat:rhel_tus:8.8
cpe:/o:redhat:enterprise_linux:10.0
cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Els
Redhat rhel Eus
Redhat rhel Tus

Wed, 02 Jul 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
Vendors & Products Redhat
Redhat enterprise Linux

Thu, 26 Jun 2025 02:45:00 +0000


Wed, 25 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Jun 2025 00:30:00 +0000

Type Values Removed Values Added
Title firefox: Content-Disposition header ignored when a file is included in an embed or object tag
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

threat_severity

Moderate


Tue, 24 Jun 2025 12:45:00 +0000

Type Values Removed Values Added
Description When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140 and Firefox ESR < 128.12.
References

Subscriptions

Mozilla Firefox Firefox Esr
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T14:30:45.145Z

Reserved: 2025-06-20T14:51:35.561Z

Link: CVE-2025-6430

cve-icon Vulnrichment

Updated: 2025-11-03T20:07:05.987Z

cve-icon NVD

Status : Modified

Published: 2025-06-24T13:15:23.993

Modified: 2026-04-13T15:17:07.260

Link: CVE-2025-6430

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-06-24T12:28:01Z

Links: CVE-2025-6430 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T17:00:12Z

Weaknesses