Impact
Incorrect boundary conditions were found in the JavaScript: WebAssembly component. The flaw causes the component to miscalculate array lengths or memory limits, which could corrupt memory. This corruption can in theory lead to arbitrary code execution, denial of service, or instability within the affected process. The description does not detail the full range of consequences, so the impact is limited to what is known about such boundary errors.
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected. Versions before 148 of each browser contain the vulnerability; any installation of these products on Windows, macOS, Linux, or mobile platforms that predates the fix is vulnerable.
Risk and Exploitability
The CVSS base score of 7.5 indicates a high severity condition. The EPSS score is reported as less than 1 %, suggesting that real‑world exploitation is unlikely at the moment. The vulnerability is not listed in the CISA KEV catalog. The description does not specify a precise attack vector; it is inferred that triggering the flaw would require a malicious WebAssembly module, but this inference is not confirmed by the official data.
OpenCVE Enrichment