Impact
Based on the description, it is inferred that a use‑after‑free bug in Mozilla Firefox’s JavaScript WebAssembly component allows an attacker to reference memory that has already been freed, potentially corrupting the execution flow of the browser. If triggered by malicious WebAssembly code embedded in a web page, the flaw can lead to arbitrary code execution or memory corruption, compromising the confidentiality, integrity or availability of the affected user’s system.
Affected Systems
Mozilla Firefox. All versions released before 150.0.3 are affected; the vulnerability was addressed in Firefox 150.0.3 and later.
Risk and Exploitability
The CVSS score is not listed and EPSS is not available, so precise severity metrics are unknown. The vulnerability is not part of the CISA KEV catalog. However, based on the description, it is inferred that the nature of a use‑after‑free flaw typically implies a high risk of exploitation when an attacker can supply malicious WebAssembly payloads, necessitating urgent mitigation.
OpenCVE Enrichment