CVE-2025-54145: Scanning a malicious URL utilizing Firefox's open-text scheme with the QR code scanner could load arbitrary websites in Mozilla Firefox for iOS
The QR scanner could allow arbitrary websites to be opened if a user was tricked into scanning a malicious link that leveraged Firefox's open-text URL scheme This vulnerability affects Firefox for iOS < 141.
AI Analysis
Technical Summary
CVE-2025-54145 is a critical vulnerability affecting Mozilla Firefox for iOS versions prior to 141. The flaw resides in the QR code scanner functionality, which can be exploited when a user scans a malicious QR code containing a specially crafted URL that leverages Firefox's open-text URL scheme. This vulnerability is categorized under CWE-601, indicating an open redirect or URL redirection issue. When exploited, the malicious QR code causes Firefox for iOS to open arbitrary websites without user consent or awareness. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its critical severity. The vector metrics indicate that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity at a high level (C:H/I:H), but does not affect availability (A:N). This means an attacker can remotely and silently redirect users to malicious websites, potentially leading to phishing, malware delivery, or credential theft. The vulnerability is particularly dangerous because it exploits a trusted feature (QR code scanning) that users may rely on for convenience, increasing the likelihood of successful exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that users remain vulnerable until an update is released and applied.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those with employees or customers using Firefox for iOS. The ability to silently redirect users to arbitrary malicious websites can lead to credential compromise, unauthorized data access, and potential lateral movement within corporate networks if phishing or malware payloads are delivered. Sectors such as finance, healthcare, and government, which often handle sensitive personal and financial data, are particularly at risk. The vulnerability undermines user trust in secure browsing and can facilitate targeted spear-phishing campaigns leveraging QR codes distributed via email, physical posters, or digital media. Since the attack requires no user interaction beyond scanning a QR code, it can be exploited in public spaces or through social engineering. The lack of a patch increases exposure time, and organizations relying on iOS devices with Firefox installed must consider this vulnerability in their risk assessments and incident response planning.
Mitigation Recommendations
Organizations should immediately communicate the risk to users of Firefox for iOS and advise caution when scanning QR codes from untrusted sources. Until a patch is available, consider disabling or restricting the use of Firefox for iOS on corporate devices, or enforce policies that limit QR code scanning to trusted applications with verified security. Implement network-level protections such as DNS filtering and web proxy solutions to block access to known malicious domains and suspicious URLs. Security awareness training should emphasize the dangers of scanning QR codes from unknown or unsolicited sources. Monitoring network traffic for unusual outbound connections from iOS devices can help detect exploitation attempts. Once Mozilla releases a patch, prioritize prompt deployment across all affected devices. Additionally, consider integrating mobile device management (MDM) solutions to enforce application updates and restrict installation of vulnerable app versions.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Ireland
CVE-2025-54145: Scanning a malicious URL utilizing Firefox's open-text scheme with the QR code scanner could load arbitrary websites in Mozilla Firefox for iOS
Description
The QR scanner could allow arbitrary websites to be opened if a user was tricked into scanning a malicious link that leveraged Firefox's open-text URL scheme This vulnerability affects Firefox for iOS < 141.
AI-Powered Analysis
Technical Analysis
CVE-2025-54145 is a critical vulnerability affecting Mozilla Firefox for iOS versions prior to 141. The flaw resides in the QR code scanner functionality, which can be exploited when a user scans a malicious QR code containing a specially crafted URL that leverages Firefox's open-text URL scheme. This vulnerability is categorized under CWE-601, indicating an open redirect or URL redirection issue. When exploited, the malicious QR code causes Firefox for iOS to open arbitrary websites without user consent or awareness. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its critical severity. The vector metrics indicate that the attack can be performed remotely (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality and integrity at a high level (C:H/I:H), but does not affect availability (A:N). This means an attacker can remotely and silently redirect users to malicious websites, potentially leading to phishing, malware delivery, or credential theft. The vulnerability is particularly dangerous because it exploits a trusted feature (QR code scanning) that users may rely on for convenience, increasing the likelihood of successful exploitation. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that users remain vulnerable until an update is released and applied.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those with employees or customers using Firefox for iOS. The ability to silently redirect users to arbitrary malicious websites can lead to credential compromise, unauthorized data access, and potential lateral movement within corporate networks if phishing or malware payloads are delivered. Sectors such as finance, healthcare, and government, which often handle sensitive personal and financial data, are particularly at risk. The vulnerability undermines user trust in secure browsing and can facilitate targeted spear-phishing campaigns leveraging QR codes distributed via email, physical posters, or digital media. Since the attack requires no user interaction beyond scanning a QR code, it can be exploited in public spaces or through social engineering. The lack of a patch increases exposure time, and organizations relying on iOS devices with Firefox installed must consider this vulnerability in their risk assessments and incident response planning.
Mitigation Recommendations
Organizations should immediately communicate the risk to users of Firefox for iOS and advise caution when scanning QR codes from untrusted sources. Until a patch is available, consider disabling or restricting the use of Firefox for iOS on corporate devices, or enforce policies that limit QR code scanning to trusted applications with verified security. Implement network-level protections such as DNS filtering and web proxy solutions to block access to known malicious domains and suspicious URLs. Security awareness training should emphasize the dangers of scanning QR codes from unknown or unsolicited sources. Monitoring network traffic for unusual outbound connections from iOS devices can help detect exploitation attempts. Once Mozilla releases a patch, prioritize prompt deployment across all affected devices. Additionally, consider integrating mobile device management (MDM) solutions to enforce application updates and restrict installation of vulnerable app versions.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-07-17T02:35:52.285Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a4e678ad5a09ad00fb5d82
Added to database: 8/19/2025, 9:02:48 PM
Last enriched: 8/27/2025, 1:12:17 AM
Last updated: 9/4/2025, 10:23:07 PM
Views: 8
Related Threats
CVE-2025-58362: CWE-706: Use of Incorrectly-Resolved Name or Reference in honojs hono
HighCVE-2025-58179: CWE-918: Server-Side Request Forgery (SSRF) in withastro astro
HighCVE-2025-55739: CWE-798: Use of Hard-coded Credentials in FreePBX security-reporting
MediumCVE-2025-58352: CWE-613: Insufficient Session Expiration in WeblateOrg weblate
LowCVE-2025-55244: CWE-284: Improper Access Control in Microsoft Azure Bot Service
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.