Impact
The vulnerability allows a malicious website or script to bypass the cookie mitigation policies implemented in Firefox's Networking: Cookies component. By circumventing these restrictions, an attacker could set or read cookies that should be blocked, potentially enabling session hijacking, cross‑site request forgery, or other credential theft techniques. No CVSS score is provided, so the exact severity is unclear, but the ability to override cookie policies suggests a significant impact on confidentiality and integrity of user authentication data.
Affected Systems
Mozilla Firefox products are affected. Versions before 150 lack the fix, while Firefox 150 and later incorporate the patch. All platforms running these vulnerable versions of Firefox are potentially impacted.
Risk and Exploitability
The EPSS metric is not available, and the vulnerability is not listed in CISA's KEV catalog. Attackers would likely need to supply malicious web content that exploits the cookie processing flow; this can occur through normal browser usage, indicating a usable path for exploitation. Although no official CVSS score is cited, the nature of bypassing cookie mitigations points to moderate to high risk, especially in environments where strict cookie policies are required.
OpenCVE Enrichment