Metrics
Affected Vendors & Products
Mon, 20 Oct 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft
Microsoft windows Mozilla Mozilla firefox Mozilla firefox Esr Mozilla thunderbird |
|
Vendors & Products |
Microsoft
Microsoft windows Mozilla Mozilla firefox Mozilla firefox Esr Mozilla thunderbird |
Wed, 15 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-116 | |
Metrics |
cvssV3_1
|
ssvc
|
Wed, 15 Oct 2025 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | thunderbird: firefox: Potential user-assisted code execution in “Copy as cURL” command | |
Weaknesses | CWE-88 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 14 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect Firefox running on other operating systems. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4. | |
References |
|

Status: PUBLISHED
Assigner: mozilla
Published: 2025-10-14T12:27:35.913Z
Updated: 2025-10-21T03:55:17.322Z
Reserved: 2025-10-13T19:50:10.388Z
Link: CVE-2025-11713

Updated: 2025-10-15T13:21:42.081Z

Status : Analyzed
Published: 2025-10-14T13:15:37.567
Modified: 2025-10-20T20:19:48.777
Link: CVE-2025-11713
