CVE-2025-5020: Links using non-HTTP schemes opened from other apps such as Safari could have allowed spoofing of website addresses in Mozilla Firefox for iOS
Opening maliciously-crafted URLs in Firefox from other apps such as Safari could have allowed attackers to spoof website addresses if the URLs utilized non-HTTP schemes used internally by the Firefox iOS client This vulnerability affects Firefox for iOS < 139.
AI Analysis
Technical Summary
CVE-2025-5020 is a medium-severity vulnerability affecting Mozilla Firefox for iOS versions prior to 139. The issue arises when Firefox for iOS opens links using non-HTTP schemes that are invoked from other applications such as Safari. Specifically, maliciously crafted URLs leveraging internal non-HTTP schemes used by Firefox iOS could allow an attacker to spoof website addresses displayed within Firefox. This spoofing could mislead users into believing they are visiting a legitimate website when in fact they are interacting with a malicious or fraudulent site. The vulnerability is classified under CWE-939, which relates to improper control of a resource through its lifetime, indicating that the handling of these non-HTTP scheme URLs is not properly validated or sanitized. The CVSS 3.1 base score is 4.3, reflecting a medium impact primarily due to the lack of confidentiality impact but with some integrity concerns and no availability impact. Exploitation requires no privileges but does require user interaction (clicking a crafted link). The scope remains unchanged as the vulnerability affects only the Firefox for iOS client. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. This vulnerability could be leveraged in phishing or social engineering attacks to trick users into divulging sensitive information or credentials by impersonating trusted websites within the Firefox iOS browser environment.
Potential Impact
For European organizations, the primary risk lies in targeted phishing campaigns exploiting this vulnerability to deceive users into visiting spoofed websites that appear legitimate within Firefox for iOS. This could lead to credential theft, unauthorized access to corporate resources, or distribution of malware. Since Firefox for iOS is used by a segment of mobile users, including employees accessing corporate resources remotely, the vulnerability could undermine trust in secure communications and increase the risk of data breaches. The lack of confidentiality impact reduces the risk of direct data leakage through the vulnerability itself, but the integrity impact could facilitate further attacks that compromise organizational security. The vulnerability's reliance on user interaction means that awareness and user training remain critical. Additionally, sectors with high reliance on mobile browsing for sensitive transactions, such as finance, healthcare, and government, may face elevated risks. Given the medium severity and the absence of known exploits, the immediate threat level is moderate but warrants prompt attention to prevent exploitation in targeted attacks.
Mitigation Recommendations
1. Update Firefox for iOS to version 139 or later as soon as the patch becomes available to remediate the vulnerability. 2. Until a patch is released, organizations should consider restricting or monitoring the use of Firefox for iOS on corporate-managed devices, especially for high-risk user groups. 3. Implement mobile device management (MDM) policies to enforce browser updates and control app installations. 4. Educate users about the risks of clicking on links from untrusted sources, particularly those opened from other apps like Safari, and encourage verification of URLs before entering sensitive information. 5. Employ network-level protections such as DNS filtering and web proxy solutions that can detect and block access to known malicious domains or suspicious URLs. 6. Monitor for phishing campaigns targeting employees that may leverage this vulnerability and enhance email filtering rules accordingly. 7. Encourage the use of multi-factor authentication (MFA) to reduce the impact of credential compromise resulting from spoofing attacks. 8. Coordinate with Mozilla security advisories to stay informed about patch releases and further technical details.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-5020: Links using non-HTTP schemes opened from other apps such as Safari could have allowed spoofing of website addresses in Mozilla Firefox for iOS
Description
Opening maliciously-crafted URLs in Firefox from other apps such as Safari could have allowed attackers to spoof website addresses if the URLs utilized non-HTTP schemes used internally by the Firefox iOS client This vulnerability affects Firefox for iOS < 139.
AI-Powered Analysis
Technical Analysis
CVE-2025-5020 is a medium-severity vulnerability affecting Mozilla Firefox for iOS versions prior to 139. The issue arises when Firefox for iOS opens links using non-HTTP schemes that are invoked from other applications such as Safari. Specifically, maliciously crafted URLs leveraging internal non-HTTP schemes used by Firefox iOS could allow an attacker to spoof website addresses displayed within Firefox. This spoofing could mislead users into believing they are visiting a legitimate website when in fact they are interacting with a malicious or fraudulent site. The vulnerability is classified under CWE-939, which relates to improper control of a resource through its lifetime, indicating that the handling of these non-HTTP scheme URLs is not properly validated or sanitized. The CVSS 3.1 base score is 4.3, reflecting a medium impact primarily due to the lack of confidentiality impact but with some integrity concerns and no availability impact. Exploitation requires no privileges but does require user interaction (clicking a crafted link). The scope remains unchanged as the vulnerability affects only the Firefox for iOS client. No known exploits are currently reported in the wild, and no patches or mitigation links have been provided yet. This vulnerability could be leveraged in phishing or social engineering attacks to trick users into divulging sensitive information or credentials by impersonating trusted websites within the Firefox iOS browser environment.
Potential Impact
For European organizations, the primary risk lies in targeted phishing campaigns exploiting this vulnerability to deceive users into visiting spoofed websites that appear legitimate within Firefox for iOS. This could lead to credential theft, unauthorized access to corporate resources, or distribution of malware. Since Firefox for iOS is used by a segment of mobile users, including employees accessing corporate resources remotely, the vulnerability could undermine trust in secure communications and increase the risk of data breaches. The lack of confidentiality impact reduces the risk of direct data leakage through the vulnerability itself, but the integrity impact could facilitate further attacks that compromise organizational security. The vulnerability's reliance on user interaction means that awareness and user training remain critical. Additionally, sectors with high reliance on mobile browsing for sensitive transactions, such as finance, healthcare, and government, may face elevated risks. Given the medium severity and the absence of known exploits, the immediate threat level is moderate but warrants prompt attention to prevent exploitation in targeted attacks.
Mitigation Recommendations
1. Update Firefox for iOS to version 139 or later as soon as the patch becomes available to remediate the vulnerability. 2. Until a patch is released, organizations should consider restricting or monitoring the use of Firefox for iOS on corporate-managed devices, especially for high-risk user groups. 3. Implement mobile device management (MDM) policies to enforce browser updates and control app installations. 4. Educate users about the risks of clicking on links from untrusted sources, particularly those opened from other apps like Safari, and encourage verification of URLs before entering sensitive information. 5. Employ network-level protections such as DNS filtering and web proxy solutions that can detect and block access to known malicious domains or suspicious URLs. 6. Monitor for phishing campaigns targeting employees that may leverage this vulnerability and enhance email filtering rules accordingly. 7. Encourage the use of multi-factor authentication (MFA) to reduce the impact of credential compromise resulting from spoofing attacks. 8. Coordinate with Mozilla security advisories to stay informed about patch releases and further technical details.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-05-21T01:18:07.391Z
- Cisa Enriched
- false
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682e0f74c4522896dcc513e2
Added to database: 5/21/2025, 5:37:56 PM
Last enriched: 7/7/2025, 1:13:53 PM
Last updated: 8/13/2025, 3:10:39 PM
Views: 18
Related Threats
CVE-2025-43201: An app may be able to unexpectedly leak a user's credentials in Apple Apple Music Classical for Android
UnknownCVE-2025-8959: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Shared library
HighCVE-2025-44201
LowCVE-2025-36088: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Storage TS4500 Library
MediumCVE-2025-43490: CWE-59 Improper Link Resolution Before File Access ('Link Following') in HP, Inc. HP Hotkey Support Software
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.