Skip to main content

CVE-2025-54145: Scanning a malicious URL utilizing Firefox's open-text scheme with the QR code scanner could load arbitrary websites in Mozilla Firefox for iOS

Critical
VulnerabilityCVE-2025-54145cvecve-2025-54145
Published: Tue Aug 19 2025 (08/19/2025, 20:52:48 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox for iOS

Description

The QR scanner could allow arbitrary websites to be opened if a user was tricked into scanning a malicious link that leveraged Firefox's open-text URL scheme This vulnerability affects Firefox for iOS < 141.

AI-Powered Analysis

AILast updated: 08/27/2025, 01:12:17 UTC

Technical Analysis

CVE-2025-54145 is a critical vulnerability affecting Mozilla Firefox for iOS versions prior to 141. The flaw resides in the QR code scanner functionality, which can be exploited when a user scans a malicious QR code containing a specially crafted URL that leverages Firefox's open-text URL scheme. This vulnerability is categorized under CWE-601, indicating an open redirect or URL redirection issue. When exploited, the malicious QR code causes Firefox for iOS to open arbitrary websites without user consent or awareness. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its critical severity. The vector metrics indicate that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity at a high level (C:H/I:H), but does not affect availability (A:N). This means an attacker can remotely and silently redirect users to malicious websites, potentially leading to phishing, malware delivery, or credential theft. The vulnerability is particularly dangerous because it exploits a trusted feature (QR code scanning) that users may rely on for convenience, increasing the likelihood of successful exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that users remain vulnerable until an update is released and applied.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those with employees or customers using Firefox for iOS. The ability to silently redirect users to arbitrary malicious websites can lead to credential compromise, unauthorized data access, and potential lateral movement within corporate networks if phishing or malware payloads are delivered. Sectors such as finance, healthcare, and government, which often handle sensitive personal and financial data, are particularly at risk. The vulnerability undermines user trust in secure browsing and can facilitate targeted spear-phishing campaigns leveraging QR codes distributed via email, physical posters, or digital media. Since the attack requires no user interaction beyond scanning a QR code, it can be exploited in public spaces or through social engineering. The lack of a patch increases exposure time, and organizations relying on iOS devices with Firefox installed must consider this vulnerability in their risk assessments and incident response planning.

Mitigation Recommendations

Organizations should immediately communicate the risk to users of Firefox for iOS and advise caution when scanning QR codes from untrusted sources. Until a patch is available, consider disabling or restricting the use of Firefox for iOS on corporate devices, or enforce policies that limit QR code scanning to trusted applications with verified security. Implement network-level protections such as DNS filtering and web proxy solutions to block access to known malicious domains and suspicious URLs. Security awareness training should emphasize the dangers of scanning QR codes from unknown or unsolicited sources. Monitoring network traffic for unusual outbound connections from iOS devices can help detect exploitation attempts. Once Mozilla releases a patch, prioritize prompt deployment across all affected devices. Additionally, consider integrating mobile device management (MDM) solutions to enforce application updates and restrict installation of vulnerable app versions.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-07-17T02:35:52.285Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a4e678ad5a09ad00fb5d82

Added to database: 8/19/2025, 9:02:48 PM

Last enriched: 8/27/2025, 1:12:17 AM

Last updated: 9/4/2025, 10:23:07 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats