Impact
A use‑after‑free flaw exists in the DOM networking component of Mozilla Firefox. This memory management error can allow an attacker to trigger a use‑after‑free condition, potentially leading to arbitrary code execution or other severe memory corruption effects. It is classified as CWE‑416, which often results in rapid and high‑impact exploitation vectors when combined with network‑driven input.
Affected Systems
The vulnerability affects all Mozilla Firefox releases prior to 150.0.2, including the Firefox ESR editions up to 140.10.2 and 115.35.2. Users running any of these versions are exposed until they upgrade to the patched releases.
Risk and Exploitability
No EPSS information is available and the vulnerability is not listed in the CISA KEV catalog, indicating limited publicly known exploitation data. However, because the flaw lies in a core networking component and can be invoked via malicious web content, the risk of exploitation remains significant. The CVSS score of 7.3 reflects a high severity level, suggesting that an exploitation could result in full compromise of the affected client system.
OpenCVE Enrichment