CVE-2025-1940: Vulnerability in Mozilla Firefox
A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. *This issue only affects Android versions of Firefox.*. This vulnerability was fixed in Firefox 136.
AI Analysis
Technical Summary
This vulnerability (CVE-2025-1940) affects only the Android version of Mozilla Firefox. It involves a tapjacking issue where a select option element can partially cover the confirmation prompt that appears before launching external applications. This UI obscuration could be exploited to deceive users into launching external apps without their explicit intent. The vulnerability was addressed and fixed in Firefox 136. The CVSS 3.1 base score is 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N), reflecting a network attack vector with low attack complexity, no privileges required, user interaction needed, and high confidentiality impact with limited integrity impact. The vendor advisory confirms the fix in Firefox 136 and does not report any active exploitation.
Potential Impact
The impact of this vulnerability is that an attacker could trick a user into unintentionally launching an external application by partially obscuring the confirmation prompt with a select option UI element. This could lead to unintended app launches, potentially exposing the user to further risks depending on the external app's behavior. The confidentiality impact is rated high, while integrity impact is low, and availability is not affected. This vulnerability is limited to Firefox on Android devices.
Mitigation Recommendations
Mozilla fixed this vulnerability in Firefox version 136. Users of Firefox on Android should update to version 136 or later to remediate this issue. There is no indication from the vendor advisory that additional mitigations or workarounds are required. Patch status is confirmed as fixed in Firefox 136.
CVE-2025-1940: Vulnerability in Mozilla Firefox
Description
A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. *This issue only affects Android versions of Firefox.*. This vulnerability was fixed in Firefox 136.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2025-1940) affects only the Android version of Mozilla Firefox. It involves a tapjacking issue where a select option element can partially cover the confirmation prompt that appears before launching external applications. This UI obscuration could be exploited to deceive users into launching external apps without their explicit intent. The vulnerability was addressed and fixed in Firefox 136. The CVSS 3.1 base score is 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N), reflecting a network attack vector with low attack complexity, no privileges required, user interaction needed, and high confidentiality impact with limited integrity impact. The vendor advisory confirms the fix in Firefox 136 and does not report any active exploitation.
Potential Impact
The impact of this vulnerability is that an attacker could trick a user into unintentionally launching an external application by partially obscuring the confirmation prompt with a select option UI element. This could lead to unintended app launches, potentially exposing the user to further risks depending on the external app's behavior. The confidentiality impact is rated high, while integrity impact is low, and availability is not affected. This vulnerability is limited to Firefox on Android devices.
Mitigation Recommendations
Mozilla fixed this vulnerability in Firefox version 136. Users of Firefox on Android should update to version 136 or later to remediate this issue. There is no indication from the vendor advisory that additional mitigations or workarounds are required. Patch status is confirmed as fixed in Firefox 136.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-03-04T12:29:45.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://www.mozilla.org/security/advisories/mfsa2025-14/","vendor":"Mozilla"}]
Threat ID: 69dd057782d89c981f01727a
Added to database: 4/13/2026, 3:02:15 PM
Last enriched: 4/13/2026, 3:17:22 PM
Last updated: 4/14/2026, 7:23:29 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.