Impact
The vulnerability, called "Mitigation bypass in the DOM: Security component," removes enforcement of security checks applied to the Document Object Model in the browser. The defect was addressed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird ESR 140.10. The CVSS score of 9.8 indicates that an exploiter could achieve a highly damaging outcome, although the specific effects are not listed in the description and must be interpreted from the score alone.
Affected Systems
Mozilla Firefox versions earlier than 150 and any ESR releases prior to 140.10 are affected, as are Mozilla Thunderbird versions earlier than 150 and any ESR releases before 140.10. Users of these releases should apply the patched versions.
Risk and Exploitability
The high CVSS rating identifies this flaw as severe, while the EPSS score is not available and the vulnerability is not listed in CISA's KEV catalog, suggesting that it is not currently widely exploited. The attack vector is likely client-side, as the flaw resides in the browser’s DOM processing. In the absence of known exploitation, the risk is primarily theoretical but should be considered significant given the potential impact inferred from the CVSS score.
OpenCVE Enrichment
Debian DSA