EUVD-2025-21377

| CVE-2025-6430 MEDIUM
2025-06-24 [email protected]
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

4
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 15, 2026 - 22:36 vuln.today
EUVD ID Assigned
Mar 15, 2026 - 22:36 euvd
EUVD-2025-21377
CVE Published
Jun 24, 2025 - 13:15 nvd
MEDIUM 6.1

Description

When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.

Analysis

When a file download is specified via the Content-Disposition header, that directive would be ignored if the file was included via a &lt;embed&gt; or &lt;object&gt; tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.

Technical Context

Cross-site scripting (XSS) allows injection of client-side scripts into web pages viewed by other users due to insufficient output encoding.

Affected Products

Affected products: Mozilla Firefox

Remediation

Encode all user-supplied output contextually (HTML, JS, URL). Implement Content Security Policy (CSP) headers. Use HTTPOnly and Secure cookie flags.

Priority Score

31
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +30
POC: 0

Vendor Status

Ubuntu

Priority: Medium
firefox
Release Status Version
jammy not-affected code not present
noble not-affected code not present
oracular not-affected code not present
plucky not-affected code not present
upstream needs-triage -
questing not-affected code not present
thunderbird
Release Status Version
noble not-affected code not present
oracular not-affected code not present
plucky not-affected code not present
jammy released 1:128.12.0+build1-0ubuntu0.22.04.1
upstream released 128.12
questing not-affected code not present
mozjs38
Release Status Version
bionic needs-triage -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs52
Release Status Version
bionic ignored -
focal ignored -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs68
Release Status Version
focal ignored -
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs78
Release Status Version
jammy ignored -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs91
Release Status Version
jammy ignored -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs102
Release Status Version
jammy ignored -
noble ignored -
oracular DNE -
plucky DNE -
upstream needs-triage -
questing DNE -
mozjs115
Release Status Version
jammy DNE -
noble ignored -
oracular ignored -
plucky ignored -
upstream needs-triage -
questing DNE -

Debian

firefox
Release Status Fixed Version Urgency
sid fixed 148.0.2-1 -
(unstable) fixed 140.0-1 -
firefox-esr
Release Status Fixed Version Urgency
bullseye fixed 128.12.0esr-1~deb11u1 -
bullseye (security) fixed 140.8.0esr-1~deb11u1 -
bookworm fixed 128.12.0esr-1~deb12u1 -
bookworm (security) fixed 140.8.0esr-1~deb12u1 -
trixie (security), trixie fixed 140.8.0esr-1~deb13u1 -
forky, sid fixed 140.8.0esr-1 -
(unstable) fixed 128.12.0esr-1 -
thunderbird
Release Status Fixed Version Urgency
bullseye fixed 1:128.12.0esr-1~deb11u1 -
bullseye (security) fixed 1:140.8.0esr-1~deb11u1 -
bookworm fixed 1:128.12.0esr-1~deb12u1 -
bookworm (security) fixed 1:140.8.0esr-1~deb12u1 -
trixie (security), trixie fixed 1:140.8.0esr-1~deb13u1 -
forky, sid fixed 1:140.8.0esr-1 -
(unstable) fixed 1:128.12.0esr-1 -

Share

EUVD-2025-21377 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy