Impact
The vulnerability is a use‑after‑free flaw in the JavaScript Engine component of Mozilla Firefox and Thunderbird. This type of memory corruption can allow an attacker to execute arbitrary code, potentially compromising confidentiality, integrity, and availability of the affected system. The flaw’s nature suggests severe consequences if exploited. The issue was fixed in Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected. The vulnerability was fixed in Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10, indicating that all earlier releases before those versions are vulnerable. The affected products include the Mozilla Firefox browser and the Mozilla Thunderbird email client.
Risk and Exploitability
The CVSS score is 7.5, EPSS score is not available, and the vulnerability is not listed in CISA’s KEV catalog, indicating there is no public record of current exploitation for this issue. Nonetheless, this use‑after‑free (CWE-416) and arbitrary program control (CWE-825) flaw in web browsers and email clients is high‑risk due to its ability to enable arbitrary code execution, especially when enabled scripts or content come from untrusted sources. The lack of publicly available exploit metrics does not reduce the potential impact; it merely reflects that the vulnerability is not yet observed in the wild.
OpenCVE Enrichment
Debian DLA
Debian DSA