First published: Tue Apr 29 2025(Updated: )
Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <138 | 138 |
Firefox ESR | <115.23 | 115.23 |
Mozilla Thunderbird | <128.10 | 128.10 |
Firefox ESR | <128.10 | 128.10 |
Thunderbird | <138 | 138 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2025-2817 is classified as a medium severity vulnerability.
To fix CVE-2025-2817, update your Mozilla Firefox to version 138 or higher, or to Firefox ESR version 115.23 or higher.
CVE-2025-2817 affects Mozilla Firefox, Firefox ESR, and Thunderbird versions prior to the specified updates.
The flaw in CVE-2025-2817 involves a vulnerable update mechanism that allows a medium-integrity user process to interfere with the SYSTEM-level updater.
Yes, CVE-2025-2817 can allow attackers to bypass access controls and perform SYSTEM-level file operations.