8.1 CVE-2025-9180
Enriched by CISA Path Traversal
Same-origin policy bypass in the Graphics: Canvas2D component. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.
https://nvd.nist.gov/vuln/detail/CVE-2025-9180
Categories
CWE-346 : Origin Validation Error
The product does not properly verify that the source of data or communication is valid. Automated static analysis, commonly referred to as Static Application Security Testing (SAST), can find some instances of this weakness by analyzing source code (or binary/compiled code) without having to execute it. Typically, this is done by building a model of data flow and control flow, then searching for potentially-vulnerable patterns that connect "sources" (origins of input) with "sinks" (destinations where the data interacts with external components, a lower layer such as the OS, etc.) DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning Browser does not set Mark-of-the-Web (MotW) for a downloaded .EXE file if the name is close to the maximum path length, preventing recording of a zone identifier in the filename Zip file extraction program does not propagate Mark-of-the-Web (MotW) metadata to files that are extracted from an Internet-downloaded Zip file Zip file extraction program does not propagate Mark-of-the-Web (MotW) metadata to files that are extracted from an Internet-downloaded Zip file DNS server can accept DNS updates from hosts that it did not query, leading to cache poisoning DNS server caches glue records received from non-delegated name servers user ID obtained from untrusted source (URL) LDAP service does not verify if a particular attribute was set by the LDAP server product does not sufficiently distinguish external HTML from internal, potentially dangerous HTML, allowing bypass using special strings in the page title. Overlaps special elements. product records the reverse DNS name of a visitor in the logs, allowing spoofing and resultant XSS.
References
af854a3a-2127-422b-91ae-364da2661108
| https://lists.debian.org/debian-lts-announce/2025/08/msg00016.html |
| https://lists.debian.org/debian-lts-announce/2025/08/msg00018.html |
security@mozilla.org
| https://bugzilla.mozilla.org/show_bug.cgi?id=1979782 Issue Tracking Permissions Required |
| https://www.mozilla.org/security/advisories/mfsa2025-64/ Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-65/ Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-66/ Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-67/ Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-70/ Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-71/ Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-72/ Vendor Advisory |
AFFECTED (from MITRE)
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox |
|
| Mozilla | Firefox ESR |
|
| Mozilla | Firefox ESR |
|
| Mozilla | Firefox ESR |
|
| Mozilla | Thunderbird |
|
| Mozilla | Thunderbird |
|
| Mozilla | Thunderbird |
|
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | ||
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* | < 115.27.0 | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* | < 142.0 | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* | >= 128.0 | < 128.14.0 |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* | >= 140.0 | < 140.2.0 |
| cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:* | < 128.14.0 | |
| cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:* | < 142.0 | |
| cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:* | >= 140.0 | < 140.2.0 |
REMEDIATION
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| 111 | JSON Hijacking (aka JavaScript Hijacking) |
High |
| 141 | Cache Poisoning |
High |
| 142 | DNS Cache Poisoning |
High |
| 160 | Exploit Script-Based APIs |
Medium |
| 21 | Exploitation of Trusted Identifiers |
High |
| 384 | Application API Message Manipulation via Man-in-the-Middle |
Low |
| 385 | Transaction or Event Tampering via Application API Manipulation |
Medium |
| 386 | Application API Navigation Remapping |
Medium |
| 387 | Navigation Remapping To Propagate Malicious Content |
Medium |
| 388 | Application API Button Hijacking |
Medium |
| 510 | SaaS User Request Forgery |
Medium |
| 59 | Session Credential Falsification through Prediction |
High |
| 60 | Reusing Session IDs (aka Session Replay) |
High |
| 75 | Manipulating Writeable Configuration Files |
Very High |
| 76 | Manipulating Web Input to File System Calls |
Very High |
| 89 | Pharming |
Very High |
MITRE
Techniques
| id | description |
|---|---|
| T1134 | Access Token Manipulation |
| T1134.001 | Access Token Manipulation:Token Impersonation/Theft |
| T1528 | Steal Application Access Token |
| T1539 | Steal Web Session Cookie |
| T1550.004 | Use Alternate Authentication Material:Web Session Cookie |
| T1557.002 | Adversary-in-the-Middle: ARP Cache Poisoning |
| T1584.002 | Compromise Infrastructure: DNS Server |
| © 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. | |
Mitigations
| id | description |
|---|---|
| M1018 | An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
| M1018 | An adversary must already have administrator level access on the local system to make full use of this technique; be sure to restrict users and accounts to the least privileges they require. |
| M1017 | Users need to be trained to not authorize third-party applications they don’t recognize. The user should pay particular attention to the redirect URL: if the URL is a misspelled or convoluted sequence of words related to an expected service or SaaS application, the website is likely trying to spoof a legitimate service. Users should also be cautious about the permissions they are granting to apps. For example, offline access and access to read emails should excite higher suspicions because adversaries can utilize SaaS APIs to discover credentials and other sensitive communications. |
| M1017 | Train users to identify aspects of phishing attempts where they're asked to enter credentials into a site that has the incorrect domain for the application they are logging into. Additionally, train users not to run untrusted JavaScript in their browser, such as by copying and pasting code or dragging and dropping bookmarklets. |
| M1054 | Configure browsers or tasks to regularly delete persistent cookies. |
| M1017 | Train users to be suspicious about certificate errors. Adversaries may use their own certificates in an attempt to intercept HTTPS traffic. Certificate errors may arise when the application’s certificate does not match the one expected by the host. |
| M1056 | This technique cannot be easily mitigated with preventive controls since it is based on behaviors performed outside of the scope of enterprise defenses and controls. |
| © 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. | |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
