CVE-2025-11717: The password edit screen was not hidden in Android card view in Mozilla Firefox
When switching between Android apps using the card carousel Firefox shows a black screen as its card image when a password-related screen was the last one being used. Prior to Firefox 144 the password edit screen was visible. This vulnerability affects Firefox < 144.
AI Analysis
Technical Summary
CVE-2025-11717 is a privacy vulnerability affecting Mozilla Firefox on Android devices running versions prior to 144. The issue arises from the way Firefox integrates with the Android operating system's app switcher (card carousel) feature. When users switch between apps, Android captures a snapshot of the app's last screen to display as a card image. For security-sensitive screens, such as password edit dialogs, it is standard practice to obscure or hide these snapshots to prevent sensitive information leakage. However, in Firefox versions before 144, the password edit screen was not properly hidden or obscured. Instead, the actual password edit UI was visible as the card image in the app switcher. This means that anyone with physical access to the device or who can view the app switcher can see the password input fields or related sensitive UI elements, potentially exposing passwords or password hints. The vulnerability does not require any special user interaction beyond normal app switching and does not involve remote exploitation. It is a local privacy leak. Mozilla addressed the issue in Firefox 144 by ensuring that password-related screens are replaced with a black or generic image in the card carousel, preventing sensitive data exposure. No known exploits in the wild have been reported. The vulnerability affects all Firefox Android users on versions prior to 144, regardless of specific device models. Because the flaw is related to UI rendering in the app switcher, it is specific to Android platforms and does not affect desktop or iOS versions of Firefox. The lack of a CVSS score suggests this is a moderate privacy issue rather than a critical remote code execution or privilege escalation vulnerability.
Potential Impact
For European organizations, this vulnerability poses a confidentiality risk by potentially exposing sensitive password information through the Android app switcher interface. Employees using affected Firefox versions on Android devices in shared or public environments could inadvertently reveal passwords or password-related UI elements to unauthorized viewers. This could facilitate social engineering, credential theft, or unauthorized access to corporate accounts. While the vulnerability does not enable remote exploitation or system compromise, the local exposure of sensitive data can undermine trust and compliance with data protection regulations such as GDPR. Organizations with strict privacy policies or those handling sensitive data (e.g., financial institutions, healthcare providers) are particularly at risk. The impact is heightened in scenarios where devices are shared, left unattended, or inspected by malicious insiders. However, the scope is limited to Firefox on Android and requires physical or local access to the device. The absence of known exploits reduces immediate risk but does not eliminate the potential for opportunistic data leakage.
Mitigation Recommendations
The primary mitigation is to upgrade Mozilla Firefox on Android devices to version 144 or later, where the vulnerability has been fixed by obscuring password-related screens in the app switcher. Organizations should enforce or encourage timely browser updates through mobile device management (MDM) solutions or user education. Additionally, users should be trained to lock their devices when not in use and to avoid leaving sensitive screens open when switching apps. Implementing screen lock timeouts and biometric authentication can reduce the risk of unauthorized access to the app switcher. For highly sensitive environments, consider restricting the use of Firefox on Android or using browsers with verified privacy protections. Monitoring for unusual access patterns or insider threats can also help detect exploitation attempts. Finally, organizations should review their mobile security policies to include awareness of UI-based privacy leaks and incorporate this vulnerability into their risk assessments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Spain, Italy
CVE-2025-11717: The password edit screen was not hidden in Android card view in Mozilla Firefox
Description
When switching between Android apps using the card carousel Firefox shows a black screen as its card image when a password-related screen was the last one being used. Prior to Firefox 144 the password edit screen was visible. This vulnerability affects Firefox < 144.
AI-Powered Analysis
Technical Analysis
CVE-2025-11717 is a privacy vulnerability affecting Mozilla Firefox on Android devices running versions prior to 144. The issue arises from the way Firefox integrates with the Android operating system's app switcher (card carousel) feature. When users switch between apps, Android captures a snapshot of the app's last screen to display as a card image. For security-sensitive screens, such as password edit dialogs, it is standard practice to obscure or hide these snapshots to prevent sensitive information leakage. However, in Firefox versions before 144, the password edit screen was not properly hidden or obscured. Instead, the actual password edit UI was visible as the card image in the app switcher. This means that anyone with physical access to the device or who can view the app switcher can see the password input fields or related sensitive UI elements, potentially exposing passwords or password hints. The vulnerability does not require any special user interaction beyond normal app switching and does not involve remote exploitation. It is a local privacy leak. Mozilla addressed the issue in Firefox 144 by ensuring that password-related screens are replaced with a black or generic image in the card carousel, preventing sensitive data exposure. No known exploits in the wild have been reported. The vulnerability affects all Firefox Android users on versions prior to 144, regardless of specific device models. Because the flaw is related to UI rendering in the app switcher, it is specific to Android platforms and does not affect desktop or iOS versions of Firefox. The lack of a CVSS score suggests this is a moderate privacy issue rather than a critical remote code execution or privilege escalation vulnerability.
Potential Impact
For European organizations, this vulnerability poses a confidentiality risk by potentially exposing sensitive password information through the Android app switcher interface. Employees using affected Firefox versions on Android devices in shared or public environments could inadvertently reveal passwords or password-related UI elements to unauthorized viewers. This could facilitate social engineering, credential theft, or unauthorized access to corporate accounts. While the vulnerability does not enable remote exploitation or system compromise, the local exposure of sensitive data can undermine trust and compliance with data protection regulations such as GDPR. Organizations with strict privacy policies or those handling sensitive data (e.g., financial institutions, healthcare providers) are particularly at risk. The impact is heightened in scenarios where devices are shared, left unattended, or inspected by malicious insiders. However, the scope is limited to Firefox on Android and requires physical or local access to the device. The absence of known exploits reduces immediate risk but does not eliminate the potential for opportunistic data leakage.
Mitigation Recommendations
The primary mitigation is to upgrade Mozilla Firefox on Android devices to version 144 or later, where the vulnerability has been fixed by obscuring password-related screens in the app switcher. Organizations should enforce or encourage timely browser updates through mobile device management (MDM) solutions or user education. Additionally, users should be trained to lock their devices when not in use and to avoid leaving sensitive screens open when switching apps. Implementing screen lock timeouts and biometric authentication can reduce the risk of unauthorized access to the app switcher. For highly sensitive environments, consider restricting the use of Firefox on Android or using browsers with verified privacy protections. Monitoring for unusual access patterns or insider threats can also help detect exploitation attempts. Finally, organizations should review their mobile security policies to include awareness of UI-based privacy leaks and incorporate this vulnerability into their risk assessments.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-10-13T19:50:16.067Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ee47d0509368ccaa6fc99b
Added to database: 10/14/2025, 12:53:36 PM
Last enriched: 10/14/2025, 1:07:20 PM
Last updated: 10/16/2025, 9:41:56 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55091: CWE-125 Out-of-bounds Read in Eclipse Foundation NetX Duo
MediumCVE-2025-41021: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Sergestec SISTICK
MediumCVE-2025-41020: CWE-639 Authorization Bypass Through User-Controlled Key in Sergestec Exito
HighCVE-2025-41019: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Sergestec SISTICK
CriticalCVE-2025-41018: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Sergestec Exito
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.