CVE-2025-11716
MEDIUMCVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Lifecycle Timeline
1DescriptionNVD
Links in a sandboxed iframe could open an external app on Android without the required "allow-" permission. This vulnerability was fixed in Firefox 144 and Thunderbird 144.
AnalysisAI
Sandboxed iframes in Firefox and Thunderbird can bypass Android permission restrictions to launch external applications without the required allow-permissions, enabling attackers to trigger unintended app launches through malicious links. Unauthenticated remote attackers can exploit this via user interaction (link click) to achieve integrity impact. Firefox 144 and Thunderbird 144 contain fixes; no public exploit code or active exploitation has been identified.
Technical ContextAI
This vulnerability stems from improper permission enforcement in the iframe sandbox implementation on Android. The sandboxing mechanism is designed to restrict capabilities of untrusted content via the 'allow-' permission attributes (e.g., allow-top-navigation, allow-popups). However, links within sandboxed iframes could circumvent this policy and trigger external app launches-a capability that should be restricted unless explicitly permitted. The root cause (CWE-284: Improper Access Control) indicates the sandbox boundary enforcement failed to properly validate or restrict access to the system's app-launching functionality. This affects Mozilla Firefox and Thunderbird across their Android builds, where the sandboxing model is critical for isolating web content from sensitive platform features.
RemediationAI
Vendor-released patch: Firefox 144 and Thunderbird 144. Update to these versions or later to eliminate the vulnerability. No workarounds are available for earlier versions; users relying on older Firefox or Thunderbird releases should implement the patch immediately. Administrators managing Firefox or Thunderbird deployments on Android should enable automatic updates or manually deploy Firefox 144+ and Thunderbird 144+ to affected devices. Consult Mozilla's security advisories (https://www.mozilla.org/security/advisories/mfsa2025-81/ and https://www.mozilla.org/security/advisories/mfsa2025-84/) for release notes and any platform-specific deployment guidance.
Vendor StatusVendor
Share
External POC / Exploit Code
Leaving vuln.today