CVE-2025-14744: Vulnerability in Mozilla Firefox for iOS
Unicode RTLO characters could allow malicious websites to spoof filenames in the downloads UI for Firefox for iOS, potentially tricking users into saving files of an unexpected file type. This vulnerability was fixed in Firefox for iOS 144.0.
AI Analysis
Technical Summary
This vulnerability involves the use of Unicode RTLO characters to manipulate how filenames are displayed in the Firefox for iOS downloads UI, enabling filename spoofing. This could mislead users into saving files that appear to be of one type but are actually of another, potentially increasing the risk of executing malicious files. The flaw is tracked as CWE-451 (Incorrect Expression of Filename or Path). Mozilla fixed this issue in Firefox for iOS 144.0, which was released on October 12, 2025. The advisory was published later on December 16, 2025, after the fix was already available.
Potential Impact
The vulnerability allows an attacker to spoof filenames in the downloads UI, potentially tricking users into saving files with unexpected file types. This could lead to users inadvertently opening malicious files. However, the vendor rates the impact as low, and there are no known exploits in the wild. The CVSS score is 6.5 (medium severity), reflecting the potential for user interface deception leading to impact on integrity but no direct confidentiality or availability impact.
Mitigation Recommendations
A fix for this vulnerability is available and was included in Firefox for iOS version 144.0, released on October 12, 2025. Users and administrators should ensure that Firefox for iOS is updated to version 144.0 or later to mitigate this issue. Since the vendor advisory confirms the fix is already released, no additional mitigation steps are required beyond applying the update.
CVE-2025-14744: Vulnerability in Mozilla Firefox for iOS
Description
Unicode RTLO characters could allow malicious websites to spoof filenames in the downloads UI for Firefox for iOS, potentially tricking users into saving files of an unexpected file type. This vulnerability was fixed in Firefox for iOS 144.0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves the use of Unicode RTLO characters to manipulate how filenames are displayed in the Firefox for iOS downloads UI, enabling filename spoofing. This could mislead users into saving files that appear to be of one type but are actually of another, potentially increasing the risk of executing malicious files. The flaw is tracked as CWE-451 (Incorrect Expression of Filename or Path). Mozilla fixed this issue in Firefox for iOS 144.0, which was released on October 12, 2025. The advisory was published later on December 16, 2025, after the fix was already available.
Potential Impact
The vulnerability allows an attacker to spoof filenames in the downloads UI, potentially tricking users into saving files with unexpected file types. This could lead to users inadvertently opening malicious files. However, the vendor rates the impact as low, and there are no known exploits in the wild. The CVSS score is 6.5 (medium severity), reflecting the potential for user interface deception leading to impact on integrity but no direct confidentiality or availability impact.
Mitigation Recommendations
A fix for this vulnerability is available and was included in Firefox for iOS version 144.0, released on October 12, 2025. Users and administrators should ensure that Firefox for iOS is updated to version 144.0 or later to mitigate this issue. Since the vendor advisory confirms the fix is already released, no additional mitigation steps are required beyond applying the update.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-12-15T19:44:44.939Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69440f154eb3efac368cd6fe
Added to database: 12/18/2025, 2:26:29 PM
Last enriched: 4/14/2026, 11:40:43 AM
Last updated: 5/8/2026, 6:59:42 AM
Views: 104
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.