Skip to main content

CVE-2025-6434: HTTPS-Only exception screen lacked anti-clickjacking delay in Mozilla Firefox

Medium
VulnerabilityCVE-2025-6434cvecve-2025-6434
Published: Tue Jun 24 2025 (06/24/2025, 12:28:04 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

The exception page for the HTTPS-Only feature, displayed when a website is opened via HTTP, lacked an anti-clickjacking delay, potentially allowing an attacker to trick a user into granting an exception and loading a webpage over HTTP. This vulnerability affects Firefox < 140 and Thunderbird < 140.

AI-Powered Analysis

AILast updated: 07/14/2025, 20:37:36 UTC

Technical Analysis

CVE-2025-6434 is a medium-severity vulnerability affecting Mozilla Firefox and Thunderbird versions prior to 140. The issue lies in the HTTPS-Only mode exception screen, which is presented to users when they attempt to access a website over HTTP rather than HTTPS. This screen allows users to grant an exception to load the site over HTTP despite the HTTPS-Only policy. However, the exception page lacked an anti-clickjacking delay mechanism, which is a security control designed to prevent malicious overlays or UI redressing attacks. Without this delay, an attacker could craft a malicious webpage that tricks a user into clicking on the exception prompt unintentionally, thereby granting the exception and allowing the site to load over an insecure HTTP connection. This undermines the security guarantees of HTTPS-Only mode by enabling forced downgrades to HTTP, potentially exposing users to man-in-the-middle attacks or eavesdropping. The vulnerability does not impact confidentiality directly but affects integrity by allowing an attacker to bypass HTTPS enforcement. Exploitation requires user interaction (UI:R) but no privileges or authentication. The vulnerability is classified under CWE-1021 (Improper Restriction of Rendered UI Layers or Frames), indicating a failure to properly protect UI elements from clickjacking. There are no known exploits in the wild as of the publication date, and no patch links were provided in the source data, but it is expected that Mozilla would address this in upcoming releases. The CVSS score is 4.3 (medium), reflecting the limited impact and required user interaction.

Potential Impact

For European organizations, this vulnerability could weaken the security posture of users relying on Firefox or Thunderbird's HTTPS-Only mode, especially in environments where sensitive data is accessed via web applications. Attackers could exploit this flaw to bypass HTTPS enforcement, exposing users to interception or manipulation of data transmitted over HTTP. This is particularly concerning for sectors handling personal data under GDPR, financial services, and government entities where secure communications are critical. While the vulnerability requires user interaction, phishing or social engineering campaigns could leverage this to trick employees into allowing insecure connections, increasing the risk of credential theft or data leakage. The impact is more pronounced in organizations with strict HTTPS policies relying on browser enforcement rather than network-level controls. However, since the vulnerability does not allow direct code execution or privilege escalation, the overall risk is moderate but non-negligible.

Mitigation Recommendations

European organizations should ensure that all Firefox and Thunderbird installations are updated to version 140 or later once patches are released by Mozilla. Until then, organizations can mitigate risk by disabling HTTPS-Only mode or restricting its use to trusted sites only, reducing exposure to the exception screen. User awareness training should emphasize caution when interacting with browser prompts and exception dialogs, highlighting the risk of clickjacking attacks. Network-level controls such as enforcing HTTPS via HTTP Strict Transport Security (HSTS) policies and web proxies can reduce reliance on client-side enforcement. Additionally, deploying Content Security Policy (CSP) headers that prevent framing or embedding of sensitive pages can help mitigate clickjacking risks. Monitoring for suspicious user behavior or unusual exception grants may also help detect exploitation attempts. Finally, organizations should track Mozilla security advisories closely to apply patches promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-06-20T14:51:40.757Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685aa0274dc24046c1dc5ac4

Added to database: 6/24/2025, 12:55:03 PM

Last enriched: 7/14/2025, 8:37:36 PM

Last updated: 8/18/2025, 11:30:15 PM

Views: 25

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats