Impact
The flaw is an invalid pointer in the JavaScript WebAssembly component that can corrupt memory and potentially enable remote code execution. The description indicates that the bug might be triggered via WebAssembly, suggesting that crafted modules could cause the browser to execute arbitrary code. Based on the description, it is inferred that the impact includes the possibility of remote code execution.
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected. Versions before Firefox 150 and Firefox ESR 140.10, and the corresponding Thunderbird releases before 150 and ESR 140.10, contain the vulnerability.
Risk and Exploitability
Because the flaw is an out‑of‑bounds write or use‑after‑free in the JavaScript engine, an attacker could potentially exploit the bug by delivering malicious WebAssembly code over the network. The CVSS score for this vulnerability is 6.3. Based on the description, the likely attack vector is sending crafted WebAssembly modules. The EPSS score of <1% (0.00018) indicates a very low exploitation probability, and the vulnerability is not listed in KEV, implying that no widespread exploitation has been reported yet, but the severe consequence of remote code execution justifies immediate patching.
OpenCVE Enrichment
Debian DLA
Debian DSA