Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11713: Vulnerability in Mozilla Firefox

0
High
VulnerabilityCVE-2025-11713cvecve-2025-11713
Published: Tue Oct 14 2025 (10/14/2025, 12:27:35 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 22:14:12 UTC

Technical Analysis

CVE-2025-11713 is a vulnerability identified in Mozilla Firefox and Thunderbird products prior to versions Firefox 144 and ESR 140.4. The issue stems from insufficient escaping in the 'Copy as cURL' feature specifically on Windows platforms. This feature allows users to copy network requests as cURL commands for debugging or scripting purposes. Due to improper escaping of command-line arguments, an attacker could craft malicious input that, when copied and executed by a user, leads to execution of arbitrary code on the victim's Windows machine. The vulnerability does not affect Firefox or Thunderbird running on other operating systems such as macOS or Linux. The flaw is categorized under CWE-116 (Improper Encoding or Escaping of Output), which typically leads to injection attacks. The CVSS v3.1 base score is 8.1, reflecting a high severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact includes potential compromise of confidentiality and integrity of the affected system, as arbitrary code execution could allow data theft or system manipulation. No public exploits have been reported yet, but the vulnerability is published and known. The lack of patches at the time of reporting means users must be cautious and monitor for updates from Mozilla. This vulnerability highlights the risk of features that generate executable commands without proper sanitization, especially on Windows where command-line injection is a common attack vector.

Potential Impact

The vulnerability allows an attacker to trick users into executing arbitrary code on Windows systems via the 'Copy as cURL' feature. This can lead to unauthorized access to sensitive information, data manipulation, or further system compromise. Since Firefox and Thunderbird are widely used browsers and email clients, the potential impact is significant, especially in environments where users might copy and execute cURL commands for debugging or automation. The attack requires user interaction, which limits automated exploitation but does not eliminate risk, particularly in targeted phishing or social engineering campaigns. Organizations relying on these products on Windows platforms face risks to confidentiality and integrity of their systems and data. The vulnerability does not affect availability directly but could be leveraged as part of broader attacks. The absence of known exploits reduces immediate risk but the public disclosure increases the likelihood of future exploitation attempts. Enterprises with Windows-based endpoints running vulnerable versions should consider this a high-priority issue.

Mitigation Recommendations

1. Upgrade Mozilla Firefox to version 144 or later, and Thunderbird to version 140.4 or later as soon as patches are released. 2. Until patches are available, advise users to avoid using the 'Copy as cURL' feature on Windows or to carefully inspect any copied commands before execution. 3. Implement endpoint protection solutions that can detect and block suspicious command-line executions or scripts. 4. Educate users about the risks of executing commands copied from untrusted sources, emphasizing caution with cURL commands. 5. Monitor network and endpoint logs for unusual command execution patterns that may indicate exploitation attempts. 6. Employ application whitelisting to restrict execution of unauthorized scripts or commands. 7. Maintain up-to-date threat intelligence feeds to stay informed about any emerging exploits targeting this vulnerability. 8. Consider disabling or restricting the use of developer features like 'Copy as cURL' in managed environments until fully patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-10-13T19:50:10.388Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee47cf509368ccaa6fc8ba

Added to database: 10/14/2025, 12:53:35 PM

Last enriched: 2/26/2026, 10:14:12 PM

Last updated: 3/24/2026, 10:41:47 PM

Views: 148

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses