Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1009: Use-after-free in XSLT in Mozilla Firefox

0
Critical
VulnerabilityCVE-2025-1009cvecve-2025-1009
Published: Tue Feb 04 2025 (02/04/2025, 13:58:51 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:02:18 UTC

Technical Analysis

CVE-2025-1009 is a critical security vulnerability identified in the XSLT (Extensible Stylesheet Language Transformations) processing engine of Mozilla Firefox and Thunderbird. The flaw is a use-after-free condition (CWE-416), where the application improperly handles memory after it has been freed, leading to potential memory corruption. An attacker can exploit this by supplying specially crafted XSLT data, which triggers the use-after-free scenario. This can cause the application to crash and, more critically, may allow remote attackers to execute arbitrary code on the victim's machine without requiring any privileges or user interaction. The vulnerability affects Firefox versions earlier than 135, Firefox ESR versions earlier than 115.20 and 128.7, and Thunderbird versions earlier than 128.7 and 135. The CVSS v3.1 base score of 9.8 reflects the vulnerability's high severity, with network attack vector, low attack complexity, no privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. Although no exploits are currently known to be active in the wild, the public disclosure of this vulnerability necessitates urgent attention. The lack of patch links in the provided data suggests that patches may be pending or recently released, so organizations should verify and apply updates promptly. The vulnerability's exploitation could lead to full system compromise, data theft, or disruption of services, making it a significant threat to users of affected Mozilla products.

Potential Impact

For European organizations, the impact of CVE-2025-1009 can be substantial. Firefox and Thunderbird are widely used across Europe in both private and public sectors, including government, finance, healthcare, and critical infrastructure. Exploitation could lead to unauthorized access to sensitive data, disruption of communication channels (especially via Thunderbird email client), and potential full system compromise. This poses risks to confidentiality, integrity, and availability of organizational data and services. The vulnerability's ability to be exploited remotely without user interaction increases the risk of widespread attacks, including targeted attacks against high-value entities. Organizations relying on these applications for daily operations may face operational downtime, data breaches, and reputational damage. Given the critical nature of the vulnerability and the broad deployment of affected software, European entities should prioritize remediation to mitigate potential exploitation risks.

Mitigation Recommendations

1. Immediate application of official patches from Mozilla once available is the primary mitigation step. Organizations should monitor Mozilla security advisories and update Firefox and Thunderbird to versions 135 or later, or ESR versions 115.20 and 128.7 or later. 2. Until patches are applied, consider disabling XSLT processing if feasible or restricting access to untrusted XSLT content, especially in environments where users might open untrusted XML or web content. 3. Employ network-level protections such as web filtering and intrusion prevention systems to block or detect malicious XSLT payloads. 4. Implement endpoint detection and response (EDR) solutions to monitor for abnormal application behavior indicative of exploitation attempts. 5. Conduct user awareness training to avoid opening suspicious links or attachments that could trigger the vulnerability. 6. Maintain robust backup and incident response plans to quickly recover from potential exploitation. 7. Regularly audit and inventory affected software versions across the organization to ensure timely updates. These steps go beyond generic advice by focusing on interim controls and layered defenses until patches are fully deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2025-02-04T07:26:24.494Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091a47c28fd46ded81cf40

Added to database: 11/3/2025, 9:10:31 PM

Last enriched: 11/4/2025, 1:02:18 AM

Last updated: 11/5/2025, 11:08:51 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats