CVE-2025-11940: Uncontrolled Search Path in LibreWolf
A security vulnerability has been detected in LibreWolf up to 143.0.4-1 on Windows. This affects an unknown function of the file assets/setup.nsi of the component Installer. Such manipulation leads to uncontrolled search path. The attack must be carried out locally. Attacks of this nature are highly complex. The exploitability is reported as difficult. Upgrading to version 144.0-1 mitigates this issue. The name of the patch is dd10e31dd873e9cb309fad8aed921d45bf905a55. It is suggested to upgrade the affected component.
AI Analysis
Technical Summary
CVE-2025-11940 is a vulnerability identified in the LibreWolf browser's installer component on Windows platforms, specifically affecting versions up to 143.0.4-1. The issue arises from an uncontrolled search path in the file assets/setup.nsi, which is part of the installer script. This flaw allows an attacker with local access and low-level privileges to manipulate the search path used during installation or setup, potentially causing the installer to load malicious files or code. The attack complexity is high, indicating that exploitation requires significant skill and conditions, and no user interaction is necessary. The vulnerability impacts confidentiality, integrity, and availability by potentially enabling local privilege escalation or arbitrary code execution. The vulnerability has been assigned a CVSS 4.0 score of 7.3, reflecting its high severity. The patch identified by commit dd10e31dd873e9cb309fad8aed921d45bf905a55 addresses the issue, and upgrading to LibreWolf version 144.0-1 fully mitigates the risk. No known exploits have been reported in the wild, but the vulnerability's nature warrants prompt remediation to prevent future attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments where LibreWolf is deployed on Windows systems. The local attack vector means that threat actors would need some form of initial access, such as through compromised user accounts or insider threats. Successful exploitation could lead to local privilege escalation, allowing attackers to execute arbitrary code with elevated privileges, potentially compromising sensitive data and system integrity. This could disrupt business operations and lead to data breaches, especially in sectors with high security requirements such as finance, government, and critical infrastructure. The high complexity and lack of known exploits reduce immediate risk but do not eliminate the threat, particularly in targeted attacks. Organizations relying on LibreWolf for secure browsing or privacy-focused applications must consider this vulnerability a priority for patching to maintain their security posture.
Mitigation Recommendations
European organizations should immediately upgrade all affected LibreWolf installations on Windows to version 144.0-1 or later, which contains the patch for this vulnerability. Beyond upgrading, organizations should enforce strict local access controls and monitor for unusual installer activity or unauthorized file modifications in installation directories. Implement application whitelisting to prevent unauthorized executables from running during installation processes. Conduct regular audits of user privileges to minimize the number of users with local low-level privileges that could be leveraged in such attacks. Additionally, educate users about the risks of local attacks and ensure endpoint protection solutions are up to date to detect potential exploitation attempts. For environments where upgrading is delayed, consider isolating affected systems and restricting access to trusted personnel only.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
Description
A security vulnerability has been detected in LibreWolf up to 143.0.4-1 on Windows. This affects an unknown function of the file assets/setup.nsi of the component Installer. Such manipulation leads to uncontrolled search path. The attack must be carried out locally. Attacks of this nature are highly complex. The exploitability is reported as difficult. Upgrading to version 144.0-1 mitigates this issue. The name of the patch is dd10e31dd873e9cb309fad8aed921d45bf905a55. It is suggested to upgrade the affected component.
AI-Powered Analysis
Technical Analysis
CVE-2025-11940 is a vulnerability identified in the LibreWolf browser's installer component on Windows platforms, specifically affecting versions up to 143.0.4-1. The issue arises from an uncontrolled search path in the file assets/setup.nsi, which is part of the installer script. This flaw allows an attacker with local access and low-level privileges to manipulate the search path used during installation or setup, potentially causing the installer to load malicious files or code. The attack complexity is high, indicating that exploitation requires significant skill and conditions, and no user interaction is necessary. The vulnerability impacts confidentiality, integrity, and availability by potentially enabling local privilege escalation or arbitrary code execution. The vulnerability has been assigned a CVSS 4.0 score of 7.3, reflecting its high severity. The patch identified by commit dd10e31dd873e9cb309fad8aed921d45bf905a55 addresses the issue, and upgrading to LibreWolf version 144.0-1 fully mitigates the risk. No known exploits have been reported in the wild, but the vulnerability's nature warrants prompt remediation to prevent future attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk primarily in environments where LibreWolf is deployed on Windows systems. The local attack vector means that threat actors would need some form of initial access, such as through compromised user accounts or insider threats. Successful exploitation could lead to local privilege escalation, allowing attackers to execute arbitrary code with elevated privileges, potentially compromising sensitive data and system integrity. This could disrupt business operations and lead to data breaches, especially in sectors with high security requirements such as finance, government, and critical infrastructure. The high complexity and lack of known exploits reduce immediate risk but do not eliminate the threat, particularly in targeted attacks. Organizations relying on LibreWolf for secure browsing or privacy-focused applications must consider this vulnerability a priority for patching to maintain their security posture.
Mitigation Recommendations
European organizations should immediately upgrade all affected LibreWolf installations on Windows to version 144.0-1 or later, which contains the patch for this vulnerability. Beyond upgrading, organizations should enforce strict local access controls and monitor for unusual installer activity or unauthorized file modifications in installation directories. Implement application whitelisting to prevent unauthorized executables from running during installation processes. Conduct regular audits of user privileges to minimize the number of users with local low-level privileges that could be leveraged in such attacks. Additionally, educate users about the risks of local attacks and ensure endpoint protection solutions are up to date to detect potential exploitation attempts. For environments where upgrading is delayed, consider isolating affected systems and restricting access to trusted personnel only.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-10-18T13:00:52.267Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68f4a3e9a1caf49d9dcb28ee
Added to database: 10/19/2025, 8:40:09 AM
Last enriched: 10/19/2025, 8:43:08 AM
Last updated: 10/19/2025, 2:39:56 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumCVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
UnknownCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.