Description
Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
Published: 2025-07-22
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: User-assisted code execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises from insufficient escaping in the “Copy as cURL” feature. An attacker could craft a curl command that, when a user copies it and executes it in a terminal, would run arbitrary code on the local machine. This introduces a possibility of code execution that relies on a user trusting the command, thereby compromising the integrity of the system.

Affected Systems

Affected products are Mozilla Firefox and Mozilla Thunderbird. Versions prior to Firefox 141, Firefox ESR 128.13 and 140.1, and Thunderbird 141, 128.13 and 140.1 are vulnerable. The feature is present on both the standard and ESR releases for Windows, macOS, Linux and Android. No specific operating‑system version restrictions beyond those tied to the product are listed.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity. The EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Likely exploitation requires the user to copy the malicious curl command and run it in a shell, implying a social‑engineering or phishing vector.

Generated by OpenCVE AI on April 20, 2026 at 16:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Mozilla updates for Firefox and Thunderbird, which contain the necessary escaping fixes.
  • If an update cannot be applied immediately, temporarily disable or disable the “Copy as cURL” functionality in the application settings to prevent unintended command execution.
  • Educate users about the risks of executing copied commands from untrusted sources and reinforce phishing awareness.

Generated by OpenCVE AI on April 20, 2026 at 16:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4250-1 firefox-esr security update
Debian DLA Debian DLA DLA-4253-1 thunderbird security update
Debian DSA Debian DSA DSA-5964-1 firefox-esr security update
Debian DSA Debian DSA DSA-5966-1 thunderbird security update
EUVD EUVD EUVD-2025-22367 Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
Ubuntu USN Ubuntu USN USN-7991-1 Thunderbird vulnerabilities
History

Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1. Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Thu, 30 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Title firefox: thunderbird: Potential user-assisted code execution in “Copy as cURL” command Potential user-assisted code execution in “Copy as cURL” command

Tue, 29 Jul 2025 12:30:00 +0000

Type Values Removed Values Added
Title firefox: thunderbird: Potential user-assisted code execution in “Copy as cURL” command
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:10.0
Vendors & Products Redhat
Redhat enterprise Linux
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 28 Jul 2025 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*

Wed, 23 Jul 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla firefox Esr
Mozilla thunderbird
Vendors & Products Mozilla
Mozilla firefox
Mozilla firefox Esr
Mozilla thunderbird

Wed, 23 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 22 Jul 2025 21:00:00 +0000

Type Values Removed Values Added
Description Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
References

Subscriptions

Mozilla Firefox Firefox Esr Thunderbird
Redhat Enterprise Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T14:26:55.584Z

Reserved: 2025-07-22T10:13:53.205Z

Link: CVE-2025-8030

cve-icon Vulnrichment

Updated: 2025-11-03T20:07:48.256Z

cve-icon NVD

Status : Modified

Published: 2025-07-22T21:15:50.157

Modified: 2026-04-13T15:17:09.197

Link: CVE-2025-8030

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-07-22T20:49:25Z

Links: CVE-2025-8030 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T17:00:12Z

Weaknesses