First published: Tue Apr 29 2025(Updated: )
A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <138 | |
Firefox ESR | <128.10<115.23 | |
Thunderbird | <138 | |
Mozilla Thunderbird | <128.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2362907 is considered high due to the potential for sandbox escape.
To address REDHAT-BUG-2362907, update Firefox or Thunderbird to the latest version that exceeds the affected versions.
REDHAT-BUG-2362907 affects Firefox versions below 138 and Thunderbird versions below 138.
The impact of REDHAT-BUG-2362907 includes unauthorized execution of content in a user's browser, leading to potential data compromise.
Yes, REDHAT-BUG-2362907 specifically affects Mozilla Firefox and Thunderbird.