2025-06-24
[email protected]
9.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-19086
CVE Published
Jun 24, 2025 - 13:15 nvd
CRITICAL 9.8
Description
A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.
Analysis
A denial of service vulnerability (CVSS 9.8). Critical severity with potential for significant impact on affected systems.
Technical Context
CWE-416 (Use After Free). CVSS 9.8 indicates critical severity with likely remote exploitation vector.
Affected Products
['Unspecified product']
Remediation
Monitor vendor channels for patch availability.
Priority Score
49
Low
Medium
High
Critical
KEV: 0
EPSS: +0.3
CVSS: +49
POC: 0
Vendor Status
Ubuntu
Priority: Mediumfirefox
| Release | Status | Version |
|---|---|---|
| jammy | not-affected | code not present |
| noble | not-affected | code not present |
| oracular | not-affected | code not present |
| plucky | not-affected | code not present |
| upstream | needs-triage | - |
| questing | not-affected | code not present |
thunderbird
| Release | Status | Version |
|---|---|---|
| noble | not-affected | code not present |
| oracular | not-affected | code not present |
| plucky | not-affected | code not present |
| jammy | released | 1:128.12.0+build1-0ubuntu0.22.04.1 |
| upstream | released | 128.12 |
| questing | not-affected | code not present |
mozjs38
| Release | Status | Version |
|---|---|---|
| bionic | needs-triage | - |
| jammy | DNE | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
mozjs52
| Release | Status | Version |
|---|---|---|
| bionic | ignored | - |
| focal | ignored | - |
| jammy | DNE | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
mozjs68
| Release | Status | Version |
|---|---|---|
| focal | ignored | - |
| jammy | DNE | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
mozjs78
| Release | Status | Version |
|---|---|---|
| jammy | ignored | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
mozjs91
| Release | Status | Version |
|---|---|---|
| jammy | ignored | - |
| noble | DNE | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
mozjs102
| Release | Status | Version |
|---|---|---|
| jammy | ignored | - |
| noble | ignored | - |
| oracular | DNE | - |
| plucky | DNE | - |
| upstream | needs-triage | - |
| questing | DNE | - |
mozjs115
| Release | Status | Version |
|---|---|---|
| jammy | DNE | - |
| noble | ignored | - |
| oracular | ignored | - |
| plucky | ignored | - |
| upstream | needs-triage | - |
| questing | DNE | - |
Debian
firefox
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| sid | fixed | 148.0.2-1 | - |
| (unstable) | fixed | 140.0-1 | - |
firefox-esr
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 128.12.0esr-1~deb11u1 | - |
| bullseye (security) | fixed | 140.8.0esr-1~deb11u1 | - |
| bookworm | fixed | 128.12.0esr-1~deb12u1 | - |
| bookworm (security) | fixed | 140.8.0esr-1~deb12u1 | - |
| trixie (security), trixie | fixed | 140.8.0esr-1~deb13u1 | - |
| forky, sid | fixed | 140.8.0esr-1 | - |
| (unstable) | fixed | 128.12.0esr-1 | - |
thunderbird
| Release | Status | Fixed Version | Urgency |
|---|---|---|---|
| bullseye | fixed | 1:128.12.0esr-1~deb11u1 | - |
| bullseye (security) | fixed | 1:140.8.0esr-1~deb11u1 | - |
| bookworm | fixed | 1:128.12.0esr-1~deb12u1 | - |
| bookworm (security) | fixed | 1:140.8.0esr-1~deb12u1 | - |
| trixie (security), trixie | fixed | 1:140.8.0esr-1~deb13u1 | - |
| forky, sid | fixed | 1:140.8.0esr-1 | - |
| (unstable) | fixed | 1:128.12.0esr-1 | - |
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-19086