Impact
This vulnerability is a use‑after‑free condition located in the DOM core and HTML component of the Mozilla codebase. The flaw permits access to a memory object after it has been freed, which corresponds to CWE‑416 and CWE‑825. The potential impact is that an attacker could trigger the bug to execute arbitrary code in the context of the browser or mail client, compromising confidentiality, integrity, or availability of the affected system.
Affected Systems
Any installation of Mozilla Firefox or Thunderbird older than Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, or Thunderbird 140.10 is vulnerable. The issue affects both standard and ESR builds, so users on any of the listed versions are at risk.
Risk and Exploitability
The CVSS score of 7.5 indicates high severity for a use‑after‑free bug in a mainstream browser. The EPSS score is less than 1%, so the likelihood of exploitation is very low, and the vulnerability is not included in the CISA KEV catalog. Based on the description, it is inferred that the likely attack vector is the delivery of malicious content through a web page or embedded HTML that triggers the DOM bug during normal browsing or mail processing.
OpenCVE Enrichment
Debian DLA
Debian DSA