Impact
Based on the description, it is inferred that Mozilla’s Firefox implements a security component within the DOM that can be bypassed, allowing a crafted web page or script to perform privileged operations that should be protected, thereby exposing the user to unauthorized actions on data or application state. The flaw is classified as CWE‑693 and CWE‑358, indicating that security checks were improperly enforced or omitted in the execution path and that sensitive data may be inadvertently exposed.
Affected Systems
All releases of Firefox and Thunderbird older than version 150 are vulnerable, as the flaw was addressed in the 150 release cycle. Users of the affected products should review their current versions and plan an upgrade if they are running older builds.
Risk and Exploitability
The CVSS score of 5.4 places the issue in the moderate range, and the EPSS score is currently unavailable. The flaw is not listed in CISA’s KEV catalog, suggesting a lower publicly confirmed exploitation probability at present. Based on the description, it is inferred that the vulnerability manifests when a malicious site or local script leverages DOM manipulation to subvert the security component, allowing potential theft of sensitive information or escalation of user privileges. Unless mitigated, a determined attacker can exploit this path in combination with other weaknesses to increase the overall impact.
OpenCVE Enrichment