Impact
A use‑after‑free flaw (CWE‑416) is discovered in the WebAssembly component of the JavaScript engine; the bug leads to memory corruption (CWE‑825) that might allow arbitrary code execution within the browser context (inferred). This vulnerability could compromise confidentiality, integrity, and availability by allowing an attacker to run malicious code on the victim’s system.
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected. Both products contain the WebAssembly component in their JavaScript engines. The issue was addressed in version 150 of each product, meaning all earlier releases are vulnerable.
Risk and Exploitability
The EPSS score of 0.00038 (less than 1%) indicates a very low exploitation probability, and the vulnerability is not listed in the KEV catalog, so no verified exploits are known at present. The path to exploitation would likely involve delivering malicious content to the browser, such as a crafted WebAssembly script, and then triggering the use‑after‑free condition (inferred). The CVSS score of 7.5 indicates high severity based on the ability to execute arbitrary code, but the low EPSS score means the likelihood of real‑world use is uncertain.
OpenCVE Enrichment