CVE-2025-6435: Save as in Devtools could download files without sanitizing the extension in Mozilla Firefox
If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140 and Thunderbird < 140.
AI Analysis
Technical Summary
CVE-2025-6435 is a high-severity vulnerability affecting Mozilla Firefox versions prior to 140 and Thunderbird versions prior to 140. The issue arises from the way the developer tools (Devtools) handle the 'Save As' functionality in the Network tab. When a user saves a response from the Network tab using the 'Save As' context menu option, the file may be saved without the expected '.download' extension. This lack of extension sanitization can lead to the saved file having an executable extension or other potentially dangerous extensions. Consequently, a user might inadvertently execute a malicious file believing it to be safe, which could lead to arbitrary code execution or other malicious activities. The vulnerability is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 8.1, indicating a high level of severity. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) suggests that the attack can be performed remotely over the network without privileges or user interaction, but requires high attack complexity. The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full system compromise. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation relies on user awareness and cautious handling of files saved via Devtools until official updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for development teams, security analysts, and IT personnel who frequently use Firefox Devtools to inspect network traffic and save responses for analysis. If an attacker can trick a user into saving a malicious response, the user might unknowingly execute harmful code, leading to potential data breaches, system compromise, or lateral movement within corporate networks. Given that Firefox is widely used across Europe, including in government, financial, and critical infrastructure sectors, the risk of targeted attacks exploiting this vulnerability is considerable. The high confidentiality, integrity, and availability impact could result in exposure of sensitive data, disruption of services, and damage to organizational reputation. Additionally, the lack of user interaction required for exploitation (as per CVSS vector) increases the threat level, as automated or remote attacks could be feasible if combined with social engineering or other delivery mechanisms.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately update Firefox and Thunderbird to version 140 or later once patches are released by Mozilla. 2) Until patches are available, restrict the use of the 'Save As' functionality in Devtools or educate users to verify file extensions carefully before opening any saved files. 3) Employ endpoint security solutions that monitor and block execution of suspicious files, especially those originating from browser developer tools. 4) Implement strict application whitelisting policies to prevent unauthorized executables from running. 5) Conduct targeted user awareness training emphasizing the risks of opening files saved from browser tools and the importance of verifying file extensions. 6) Monitor network traffic and logs for unusual activity related to Devtools usage or unexpected file downloads. 7) Consider deploying browser configuration policies that limit or disable risky Devtools features in managed environments. These measures go beyond generic advice by focusing on controlling the specific attack vector and user behavior associated with this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland, Belgium, Finland
CVE-2025-6435: Save as in Devtools could download files without sanitizing the extension in Mozilla Firefox
Description
If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox < 140 and Thunderbird < 140.
AI-Powered Analysis
Technical Analysis
CVE-2025-6435 is a high-severity vulnerability affecting Mozilla Firefox versions prior to 140 and Thunderbird versions prior to 140. The issue arises from the way the developer tools (Devtools) handle the 'Save As' functionality in the Network tab. When a user saves a response from the Network tab using the 'Save As' context menu option, the file may be saved without the expected '.download' extension. This lack of extension sanitization can lead to the saved file having an executable extension or other potentially dangerous extensions. Consequently, a user might inadvertently execute a malicious file believing it to be safe, which could lead to arbitrary code execution or other malicious activities. The vulnerability is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 8.1, indicating a high level of severity. The vector string (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) suggests that the attack can be performed remotely over the network without privileges or user interaction, but requires high attack complexity. The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full system compromise. No known exploits are currently reported in the wild, and no patches are linked yet, indicating that mitigation relies on user awareness and cautious handling of files saved via Devtools until official updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for development teams, security analysts, and IT personnel who frequently use Firefox Devtools to inspect network traffic and save responses for analysis. If an attacker can trick a user into saving a malicious response, the user might unknowingly execute harmful code, leading to potential data breaches, system compromise, or lateral movement within corporate networks. Given that Firefox is widely used across Europe, including in government, financial, and critical infrastructure sectors, the risk of targeted attacks exploiting this vulnerability is considerable. The high confidentiality, integrity, and availability impact could result in exposure of sensitive data, disruption of services, and damage to organizational reputation. Additionally, the lack of user interaction required for exploitation (as per CVSS vector) increases the threat level, as automated or remote attacks could be feasible if combined with social engineering or other delivery mechanisms.
Mitigation Recommendations
European organizations should implement the following specific mitigation steps: 1) Immediately update Firefox and Thunderbird to version 140 or later once patches are released by Mozilla. 2) Until patches are available, restrict the use of the 'Save As' functionality in Devtools or educate users to verify file extensions carefully before opening any saved files. 3) Employ endpoint security solutions that monitor and block execution of suspicious files, especially those originating from browser developer tools. 4) Implement strict application whitelisting policies to prevent unauthorized executables from running. 5) Conduct targeted user awareness training emphasizing the risks of opening files saved from browser tools and the importance of verifying file extensions. 6) Monitor network traffic and logs for unusual activity related to Devtools usage or unexpected file downloads. 7) Consider deploying browser configuration policies that limit or disable risky Devtools features in managed environments. These measures go beyond generic advice by focusing on controlling the specific attack vector and user behavior associated with this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-06-20T14:51:42.561Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 685aa0274dc24046c1dc5ac8
Added to database: 6/24/2025, 12:55:03 PM
Last enriched: 7/14/2025, 8:37:50 PM
Last updated: 8/12/2025, 5:43:58 PM
Views: 29
Related Threats
CVE-2025-8956: Command Injection in D-Link DIR‑818L
MediumCVE-2025-7761: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Akcess-Net Lepszy BIP
MediumCVE-2025-55346: CWE-94 Improper Control of Generation of Code ('Code Injection')
CriticalCVE-2025-8943
CriticalCVE-2025-8047: CWE-829 Inclusion of Functionality from Untrusted Control Sphere in disable-right-click-powered-by-pixterme
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.