Skip to main content

CVE-2025-6435: Save as in Devtools could download files without sanitizing the extension in Mozilla Firefox

High
VulnerabilityCVE-2025-6435cvecve-2025-6435
Published: Tue Jun 24 2025 (06/24/2025, 12:28:04 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140 and Thunderbird < 140.

AI-Powered Analysis

AILast updated: 07/14/2025, 20:37:50 UTC

Technical Analysis

CVE-2025-6435 is a high-severity vulnerability affecting Mozilla Firefox versions prior to 140 and Thunderbird versions prior to 140. The issue arises from the way the developer tools (Devtools) handle the 'Save As' functionality in the Network tab. When a user saves a response from the Network tab using the 'Save As' context menu option, the file may be saved without the expected '.download' extension. This lack of extension sanitization can lead to the saved file having an executable extension or other potentially dangerous extensions. Consequently, a user might inadvertently execute a malicious file believing it to be safe, which could lead to arbitrary code execution or other malicious activities. The vulnerability is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 8.1, indicating a high level of severity. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) suggests that the attack can be performed remotely over the network without privileges or user interaction, but requires high attack complexity. The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full system compromise. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation relies on user awareness and cautious handling of files saved via Devtools until official updates are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for development teams, security analysts, and IT personnel who frequently use Firefox Devtools to inspect network traffic and save responses for analysis. If an attacker can trick a user into saving a malicious response, the user might unknowingly execute harmful code, leading to potential data breaches, system compromise, or lateral movement within corporate networks. Given that Firefox is widely used across Europe, including in government, financial, and critical infrastructure sectors, the risk of targeted attacks exploiting this vulnerability is considerable. The high confidentiality, integrity, and availability impact could result in exposure of sensitive data, disruption of services, and damage to organizational reputation. Additionally, the lack of user interaction required for exploitation (as per CVSS vector) increases the threat level, as automated or remote attacks could be feasible if combined with social engineering or other delivery mechanisms.

Mitigation Recommendations

European organizations should implement the following specific mitigation steps: 1) Immediately update Firefox and Thunderbird to version 140 or later once patches are released by Mozilla. 2) Until patches are available, restrict the use of the 'Save As' functionality in Devtools or educate users to verify file extensions carefully before opening any saved files. 3) Employ endpoint security solutions that monitor and block execution of suspicious files, especially those originating from browser developer tools. 4) Implement strict application whitelisting policies to prevent unauthorized executables from running. 5) Conduct targeted user awareness training emphasizing the risks of opening files saved from browser tools and the importance of verifying file extensions. 6) Monitor network traffic and logs for unusual activity related to Devtools usage or unexpected file downloads. 7) Consider deploying browser configuration policies that limit or disable risky Devtools features in managed environments. These measures go beyond generic advice by focusing on controlling the specific attack vector and user behavior associated with this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-06-20T14:51:42.561Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685aa0274dc24046c1dc5ac8

Added to database: 6/24/2025, 12:55:03 PM

Last enriched: 7/14/2025, 8:37:50 PM

Last updated: 8/12/2025, 5:43:58 PM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats