Impact
The flaw is located in Mozilla Firefox’s Security component. It allows an attacker, through a malicious web page or script, to read sensitive information that resides in the Document Object Model. The exposure could include URLs, user credentials, or other configuration details that normally remain confidential, resulting in an information‑exposure weakness.
Affected Systems
All releases of Mozilla Firefox prior to version 151 are affected. The issue was rectified in version 151, so any installation older than that release contains the vulnerability.
Risk and Exploitability
No CVSS score is given and the EPSS score is not available, so the exact severity and exploitation probability are not quantified. As the flaw involves data exposure in the DOM, the most likely attack vector is web‑based, where a malicious web page could trigger the bug in a user’s browser session. The lack of a KEV listing and absence of widespread exploitation evidence suggest the risk is currently low, but the impact is significant if compromised.
OpenCVE Enrichment