Impact
Based on the CVE description, the vulnerability is a spoofing issue in Firefox WebExtensions. The impact of allowing malicious extensions or scripts to impersonate legitimate sites or extensions is inferred from the term "spoofing" and the potential for phishing noted in the description. This can compromise user confidentiality and trust by presenting deceptive content as genuine.
Affected Systems
Affected products are Mozilla Firefox browsers. Version information is not available, but the flaw was fixed in Firefox 151. No other vendors were listed.
Risk and Exploitability
The CVSS score is not provided and the EPSS score is unavailable, indicating limited publicly known exploitation data. The vulnerability is not listed in CISA's KEV catalog. Based on the description, it is inferred that the likely attack vector involves a user installing or enabling a malicious WebExtension that can send spoofed requests or host content that mimics legitimate sites. The exploit requires local installation or compromise of an existing extension, so it is not remote. Because the flaw is in the browser’s extension handling, mitigation is by patching or disabling the problematic extensions.
OpenCVE Enrichment