CVE-2025-11940: Uncontrolled Search Path in LibreWolf
A security vulnerability has been detected in LibreWolf up to 143.0.4-1 on Windows. This affects an unknown function of the file assets/setup.nsi of the component Installer. Such manipulation leads to uncontrolled search path. The attack must be carried out locally. Attacks of this nature are highly complex. The exploitability is reported as difficult. Upgrading to version 144.0-1 mitigates this issue. The name of the patch is dd10e31dd873e9cb309fad8aed921d45bf905a55. It is suggested to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-11940 identifies a security vulnerability in the LibreWolf browser's Windows installer component, specifically within the assets/setup.nsi script used during installation. The vulnerability arises from an uncontrolled search path, meaning the installer may load files or dependencies from unintended or attacker-controlled locations. This can lead to the execution of malicious code with the privileges of the installer process. The attack requires local access with limited privileges and does not require user interaction, but the complexity of the attack is high, making exploitation difficult. The vulnerability impacts LibreWolf versions up to 143.0.4-1 on Windows platforms. The issue is resolved in version 144.0-1 by applying a patch identified by commit dd10e31dd873e9cb309fad8aed921d45bf905a55. The CVSS 4.0 vector (AV:L/AC:H/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X) indicates local attack vector, high attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk if leveraged by a local attacker to compromise system security during installation or update processes.
Potential Impact
For European organizations, this vulnerability could allow a local attacker to execute arbitrary code during the installation or update of LibreWolf on Windows systems, potentially leading to unauthorized access, data compromise, or system integrity violations. This is particularly concerning for organizations that rely on LibreWolf for secure browsing or have strict security policies requiring trusted software installation. The ability to manipulate the installer’s search path could facilitate privilege escalation or persistence mechanisms. Although exploitation is complex and requires local access, insider threats or attackers who gain initial footholds could leverage this vulnerability to deepen their control. The impact extends to confidentiality, integrity, and availability of affected systems, potentially disrupting business operations or exposing sensitive data.
Mitigation Recommendations
European organizations should immediately upgrade all affected LibreWolf installations on Windows to version 144.0-1 or later, which contains the patch addressing this vulnerability. Additionally, organizations should enforce strict local access controls and monitor for unauthorized local activity, especially on systems where LibreWolf is installed. Implement application whitelisting to prevent execution of unauthorized installers or scripts. Regularly audit and restrict user privileges to minimize the risk of local exploitation. Employ endpoint detection and response (EDR) solutions to detect suspicious installer behavior or attempts to manipulate file paths. Finally, educate users and administrators about the risks of local attacks and the importance of applying security updates promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
Description
A security vulnerability has been detected in LibreWolf up to 143.0.4-1 on Windows. This affects an unknown function of the file assets/setup.nsi of the component Installer. Such manipulation leads to uncontrolled search path. The attack must be carried out locally. Attacks of this nature are highly complex. The exploitability is reported as difficult. Upgrading to version 144.0-1 mitigates this issue. The name of the patch is dd10e31dd873e9cb309fad8aed921d45bf905a55. It is suggested to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-11940 identifies a security vulnerability in the LibreWolf browser's Windows installer component, specifically within the assets/setup.nsi script used during installation. The vulnerability arises from an uncontrolled search path, meaning the installer may load files or dependencies from unintended or attacker-controlled locations. This can lead to the execution of malicious code with the privileges of the installer process. The attack requires local access with limited privileges and does not require user interaction, but the complexity of the attack is high, making exploitation difficult. The vulnerability impacts LibreWolf versions up to 143.0.4-1 on Windows platforms. The issue is resolved in version 144.0-1 by applying a patch identified by commit dd10e31dd873e9cb309fad8aed921d45bf905a55. The CVSS 4.0 vector (AV:L/AC:H/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X) indicates local attack vector, high attack complexity, low privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild, but the vulnerability poses a significant risk if leveraged by a local attacker to compromise system security during installation or update processes.
Potential Impact
For European organizations, this vulnerability could allow a local attacker to execute arbitrary code during the installation or update of LibreWolf on Windows systems, potentially leading to unauthorized access, data compromise, or system integrity violations. This is particularly concerning for organizations that rely on LibreWolf for secure browsing or have strict security policies requiring trusted software installation. The ability to manipulate the installer’s search path could facilitate privilege escalation or persistence mechanisms. Although exploitation is complex and requires local access, insider threats or attackers who gain initial footholds could leverage this vulnerability to deepen their control. The impact extends to confidentiality, integrity, and availability of affected systems, potentially disrupting business operations or exposing sensitive data.
Mitigation Recommendations
European organizations should immediately upgrade all affected LibreWolf installations on Windows to version 144.0-1 or later, which contains the patch addressing this vulnerability. Additionally, organizations should enforce strict local access controls and monitor for unauthorized local activity, especially on systems where LibreWolf is installed. Implement application whitelisting to prevent execution of unauthorized installers or scripts. Regularly audit and restrict user privileges to minimize the risk of local exploitation. Employ endpoint detection and response (EDR) solutions to detect suspicious installer behavior or attempts to manipulate file paths. Finally, educate users and administrators about the risks of local attacks and the importance of applying security updates promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-18T13:00:52.267Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f4a3e9a1caf49d9dcb28ee
Added to database: 10/19/2025, 8:40:09 AM
Last enriched: 10/27/2025, 1:23:22 AM
Last updated: 12/4/2025, 12:56:49 PM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11222: na in LINE Corporation Central Dogma
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.