Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6435: Vulnerability in Mozilla Firefox

0
High
VulnerabilityCVE-2025-6435cvecve-2025-6435
Published: Tue Jun 24 2025 (06/24/2025, 12:28:04 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140 and Thunderbird < 140.

AI-Powered Analysis

AILast updated: 10/31/2025, 05:07:02 UTC

Technical Analysis

CVE-2025-6435 is a vulnerability identified in Mozilla Firefox and Thunderbird prior to version 140, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). The issue arises when a user saves a network response via the Developer Tools Network tab using the 'Save As' context menu option. Instead of appending the expected '.download' file extension, the saved file may retain its original extension, which could be an executable or other malicious file type. This improper handling increases the risk that a user might inadvertently execute a malicious file, potentially leading to arbitrary code execution or system compromise. The vulnerability has a CVSS v3.1 base score of 8.1, indicating high severity, with attack vector as network (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits have been reported in the wild yet. The vulnerability affects all Firefox and Thunderbird versions prior to 140, though exact affected versions are unspecified. The root cause is related to improper file extension handling when saving network responses, which can be exploited by attackers who can trick users into saving malicious responses. This vulnerability highlights the risks associated with developer tools features that interact with file systems without sufficient safeguards.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying heavily on Firefox and Thunderbird for daily operations, including software development, communication, and web browsing. The inadvertent execution of malicious files can lead to severe consequences such as data breaches, ransomware infections, or full system compromise. Confidentiality, integrity, and availability of sensitive organizational data could be severely impacted. Given the high CVSS score and the lack of required user interaction beyond saving a file, attackers could exploit this vulnerability remotely by convincing users to save malicious responses. This is particularly concerning for sectors with high security requirements such as finance, government, healthcare, and critical infrastructure. The absence of known exploits in the wild provides a window for proactive mitigation, but the potential for rapid exploitation remains. Additionally, the vulnerability could be leveraged in targeted attacks or supply chain compromises where malicious payloads are delivered via network responses.

Mitigation Recommendations

1. Immediate upgrade to Mozilla Firefox and Thunderbird version 140 or later, where this vulnerability is addressed. 2. Implement endpoint security policies that restrict execution of files without verified extensions or from untrusted sources, including blocking execution of files saved from browser developer tools. 3. Educate users, especially developers and IT staff, about the risks of saving and executing files from network responses and the importance of verifying file extensions before execution. 4. Employ application whitelisting to prevent unauthorized executables from running, particularly those originating from user downloads or developer tools. 5. Monitor network traffic and endpoint logs for suspicious file save activities or execution attempts related to developer tools usage. 6. Consider disabling or restricting access to the Developer Tools Network tab for non-technical users or in high-security environments. 7. Coordinate with IT security teams to integrate this vulnerability into vulnerability management and incident response workflows to ensure rapid detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-06-20T14:51:42.561Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685aa0274dc24046c1dc5ac8

Added to database: 6/24/2025, 12:55:03 PM

Last enriched: 10/31/2025, 5:07:02 AM

Last updated: 11/20/2025, 11:00:31 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats