First published: Tue Mar 04 2025(Updated: )
A web page could trick a user into setting that site as the default handler for a custom URL protocol.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <136 | |
Firefox ESR | <128.8 | |
Thunderbird | <128.8 | 128.8 |
Firefox | <136 | 136 |
Firefox ESR | <128.8 | 128.8 |
Thunderbird | <136 | 136 |
debian/firefox | 136.0.1-1 | |
debian/firefox-esr | <=115.14.0esr-1~deb11u1<=128.5.0esr-1~deb12u1 | 128.8.0esr-1~deb11u1 128.8.0esr-1~deb12u1 128.8.0esr-1 |
debian/thunderbird | <=1:115.12.0-1~deb11u1<=1:128.5.0esr-1~deb12u1 | 1:128.8.0esr-1~deb11u1 1:128.8.0esr-1~deb12u1 1:128.8.0esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2025-1935 is considered a medium severity vulnerability due to its potential to manipulate user settings.
To resolve CVE-2025-1935, update your Firefox to version 136 or Firefox ESR to version 128.8.
CVE-2025-1935 affects Firefox versions prior to 136 and Firefox ESR versions prior to 128.8.
CVE-2025-1935 represents a social engineering attack that can change the default URL protocol handler.
CVE-2025-1935 affects the Firefox browser on multiple operating systems including Windows, macOS, and Linux.