CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140 and Thunderbird < 140.
Analysis
CVE-2025-6435 is a file handling vulnerability in Firefox and Thunderbird's Developer Tools where saved network responses may lack the .download file extension, potentially allowing attackers to trick users into executing malicious executables. This affects Firefox versions below 140 and Thunderbird versions below 140. The vulnerability requires user interaction (saving and executing a file) but carries high severity (CVSS 8.1) due to potential for arbitrary code execution.
Technical Context
The vulnerability exists in the Network tab of Firefox/Thunderbird Developer Tools (DevTools), specifically in the 'Save As' context menu functionality. When a user right-clicks on a network response and selects 'Save As', the file handling mechanism fails to properly append or enforce the `.download` file extension. This relates to CWE-434 (Unrestricted Upload of File with Dangerous Type), which encompasses improper validation of file types and extensions during file operations. The root cause is insufficient file extension validation in the save dialog handler. The affected CPE would be cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* (versions <140) and cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* (versions <140). The issue affects the DevTools frontend code responsible for exporting/saving HTTP responses.
Affected Products
Mozilla Firefox (< 140); Mozilla Thunderbird (< 140)
Remediation
Patch/Update: Upgrade Firefox to version 140 or later (Mozilla) Patch/Update: Upgrade Thunderbird to version 140 or later (Mozilla) Workaround: Until patched, avoid using 'Save As' on network responses in DevTools for potentially untrusted network traffic. Manually verify file extensions before execution. (User) Mitigation: Implement application whitelisting and file execution policies to prevent execution of files saved from untrusted sources without proper validation. (Organizational) Mitigation: Configure browser to treat downloaded/saved files as requiring explicit confirmation before execution. (OS/browser)
Priority Score
Vendor Status
Ubuntu
Priority: Medium| Release | Status | Version |
|---|---|---|
| jammy | not-affected | code not present |
| noble | not-affected | code not present |
| oracular | not-affected | code not present |
| plucky | not-affected | code not present |
| upstream | needs-triage | - |
| questing | not-affected | code not present |
| Release | Status | Version |
|---|---|---|
| noble | not-affected | code not present |
| oracular | not-affected | code not present |
| plucky | not-affected | code not present |
| upstream | released | 140 |
| jammy | released | 1:140.7.1+build1-0ubuntu0.22.04.1 |
| questing | not-affected | code not present |
| Release | Status | Version |
|---|---|---|
| bionic | needs-triage | - |
| jammy | DNE | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
| Release | Status | Version |
|---|---|---|
| bionic | ignored | - |
| focal | ignored | - |
| jammy | DNE | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
| Release | Status | Version |
|---|---|---|
| focal | ignored | - |
| jammy | DNE | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
| Release | Status | Version |
|---|---|---|
| jammy | ignored | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
| Release | Status | Version |
|---|---|---|
| jammy | ignored | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
| Release | Status | Version |
|---|---|---|
| jammy | ignored | - |
| noble | ignored | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
| Release | Status | Version |
|---|---|---|
| jammy | DNE | - |
| noble | ignored | - |
| oracular | ignored | - |
| plucky | ignored | - |
| upstream | needs-triage | - |
| questing | DNE | - |
Debian
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| sid | fixed | 148.0.2-1 | - |
| (unstable) | fixed | 140.0-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-19016