Skip to main content

CVE-2025-6430: Content-Disposition header ignored when a file is included in an embed or object tag in Mozilla Firefox

Medium
VulnerabilityCVE-2025-6430cvecve-2025-6430
Published: Tue Jun 24 2025 (06/24/2025, 12:28:01 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&lt;embed&gt;` or `&lt;object&gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.

AI-Powered Analysis

AILast updated: 07/14/2025, 20:36:45 UTC

Technical Analysis

CVE-2025-6430 is a medium-severity vulnerability affecting Mozilla Firefox and Thunderbird versions prior to Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12. The vulnerability arises because the Content-Disposition HTTP header, which is intended to control file download behavior (such as forcing a file to be downloaded rather than displayed inline), is ignored when a file is embedded using the <embed> or <object> HTML tags. This behavior can be exploited by an attacker to bypass intended download restrictions and potentially execute cross-site scripting (XSS) attacks. Specifically, if an attacker can cause a victim to load a malicious file via these tags, the browser may improperly handle the file, allowing script execution in the context of the vulnerable site. This is classified under CWE-79, which corresponds to improper neutralization of input leading to XSS. The CVSS v3.1 base score is 6.1, indicating a medium severity, with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, meaning the attack can be launched remotely over the network with low complexity, no privileges required, but user interaction is needed. The scope is changed, indicating the vulnerability can affect resources beyond the initially vulnerable component. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches are linked yet. This vulnerability could be leveraged in phishing or social engineering attacks where users are tricked into visiting malicious web pages that embed harmful content, leading to script execution and potential data theft or session hijacking.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to users and systems relying on affected versions of Firefox and Thunderbird. Since Firefox is widely used across Europe for both personal and enterprise browsing, and Thunderbird is used for email communication, exploitation could lead to unauthorized disclosure of sensitive information, session hijacking, or manipulation of web content. This can impact confidentiality and integrity of data, potentially leading to data breaches or unauthorized actions performed on behalf of users. Organizations with strict data protection requirements under GDPR may face compliance issues if such an exploit leads to personal data exposure. The requirement for user interaction (visiting a malicious page) somewhat limits the attack vector but does not eliminate risk, especially in environments where users may be targeted via phishing campaigns. The vulnerability could also be used as a stepping stone for more complex attacks within corporate networks, especially if combined with other vulnerabilities or social engineering tactics.

Mitigation Recommendations

European organizations should prioritize updating Firefox and Thunderbird to versions 140 or later (and ESR 128.12 or later) as soon as patches become available. Until patches are released, organizations can implement the following mitigations: 1) Educate users about the risks of clicking on suspicious links or visiting untrusted websites, emphasizing the danger of embedded content. 2) Employ web content filtering and URL reputation services to block access to known malicious sites that might exploit this vulnerability. 3) Use browser security configurations or extensions that restrict or warn about embedded content from untrusted sources. 4) Monitor network traffic for unusual activity that could indicate exploitation attempts. 5) For email clients like Thunderbird, configure strict attachment and content handling policies to reduce exposure to malicious embedded content. 6) Consider deploying endpoint protection solutions capable of detecting and blocking XSS or script injection attempts. These targeted measures go beyond generic advice by focusing on controlling embedded content handling and user interaction vectors specific to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-06-20T14:51:35.561Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685aa0274dc24046c1dc5aa9

Added to database: 6/24/2025, 12:55:03 PM

Last enriched: 7/14/2025, 8:36:45 PM

Last updated: 8/3/2025, 12:37:27 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats