Impact
A use‑after‑free flaw was discovered in the DOM: Bindings (WebIDL) component. This vulnerability can lead to memory corruption that allows an attacker to execute arbitrary code or crash the process. The flaw is classified as CWE‑416.
Affected Systems
Mozilla Firefox and Thunderbird, including all releases prior to Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird ESR 140.8.
Risk and Exploitability
Based on the description, the likely attack vector is the processing of crafted WebIDL code, typically supplied by a malicious web page or a targeted email attachment, to trigger the use‑after‑free. The CVSS base score is 8.8, marking it high severity, but the EPSS score is below 1 % indicating a very low expected exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to supply crafted WebIDL code, typically via a malicious web page or a targeted email attachment, to trigger the use‑after‑free; the flaw is exploitable only when the vulnerable version is running and the malicious content is processed.
OpenCVE Enrichment
Debian DLA
Debian DSA