Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11717: The password edit screen was not hidden in Android card view in Mozilla Firefox

0
Critical
VulnerabilityCVE-2025-11717cvecve-2025-11717
Published: Tue Oct 14 2025 (10/14/2025, 12:27:37 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

When switching between Android apps using the card carousel Firefox shows a black screen as its card image when a password-related screen was the last one being used. Prior to Firefox 144 the password edit screen was visible. This vulnerability affects Firefox < 144.

AI-Powered Analysis

AILast updated: 10/14/2025, 13:07:20 UTC

Technical Analysis

CVE-2025-11717 is a privacy vulnerability affecting Mozilla Firefox on Android devices running versions prior to 144. The issue arises from the way Firefox integrates with the Android operating system's app switcher (card carousel) feature. When users switch between apps, Android captures a snapshot of the app's last screen to display as a card image. For security-sensitive screens, such as password edit dialogs, it is standard practice to obscure or hide these snapshots to prevent sensitive information leakage. However, in Firefox versions before 144, the password edit screen was not properly hidden or obscured. Instead, the actual password edit UI was visible as the card image in the app switcher. This means that anyone with physical access to the device or who can view the app switcher can see the password input fields or related sensitive UI elements, potentially exposing passwords or password hints. The vulnerability does not require any special user interaction beyond normal app switching and does not involve remote exploitation. It is a local privacy leak. Mozilla addressed the issue in Firefox 144 by ensuring that password-related screens are replaced with a black or generic image in the card carousel, preventing sensitive data exposure. No known exploits in the wild have been reported. The vulnerability affects all Firefox Android users on versions prior to 144, regardless of specific device models. Because the flaw is related to UI rendering in the app switcher, it is specific to Android platforms and does not affect desktop or iOS versions of Firefox. The lack of a CVSS score suggests this is a moderate privacy issue rather than a critical remote code execution or privilege escalation vulnerability.

Potential Impact

For European organizations, this vulnerability poses a confidentiality risk by potentially exposing sensitive password information through the Android app switcher interface. Employees using affected Firefox versions on Android devices in shared or public environments could inadvertently reveal passwords or password-related UI elements to unauthorized viewers. This could facilitate social engineering, credential theft, or unauthorized access to corporate accounts. While the vulnerability does not enable remote exploitation or system compromise, the local exposure of sensitive data can undermine trust and compliance with data protection regulations such as GDPR. Organizations with strict privacy policies or those handling sensitive data (e.g., financial institutions, healthcare providers) are particularly at risk. The impact is heightened in scenarios where devices are shared, left unattended, or inspected by malicious insiders. However, the scope is limited to Firefox on Android and requires physical or local access to the device. The absence of known exploits reduces immediate risk but does not eliminate the potential for opportunistic data leakage.

Mitigation Recommendations

The primary mitigation is to upgrade Mozilla Firefox on Android devices to version 144 or later, where the vulnerability has been fixed by obscuring password-related screens in the app switcher. Organizations should enforce or encourage timely browser updates through mobile device management (MDM) solutions or user education. Additionally, users should be trained to lock their devices when not in use and to avoid leaving sensitive screens open when switching apps. Implementing screen lock timeouts and biometric authentication can reduce the risk of unauthorized access to the app switcher. For highly sensitive environments, consider restricting the use of Firefox on Android or using browsers with verified privacy protections. Monitoring for unusual access patterns or insider threats can also help detect exploitation attempts. Finally, organizations should review their mobile security policies to include awareness of UI-based privacy leaks and incorporate this vulnerability into their risk assessments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-10-13T19:50:16.067Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ee47d0509368ccaa6fc99b

Added to database: 10/14/2025, 12:53:36 PM

Last enriched: 10/14/2025, 1:07:20 PM

Last updated: 10/16/2025, 9:41:56 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats