Severity
4.3MEDIUMNVD
OSV7.5
EPSS
0.2%
top 59.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 4
Latest updateJul 22

Description

A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability was fixed in Firefox 136, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

NVDmozilla/firefox< 128.8.0+1
NVDmozilla/thunderbird129.0136.0+1
Ubuntumozilla/firefox< 136.0+build3-0ubuntu0.20.04.1
Debianmozilla/thunderbird< 1:128.8.0esr-1~deb11u1+3

🔴Vulnerability Details

4
OSV
firefox vulnerabilities2025-03-06
GHSA
GHSA-c22c-4xww-2fqr: A web page could trick a user into setting that site as the default handler for a custom URL protocol2025-03-04
OSV
CVE-2025-1935: A web page could trick a user into setting that site as the default handler for a custom URL protocol2025-03-04
CVEList
Clickjacking the registerProtocolHandler info-bar2025-03-04

📋Vendor Advisories

8
Ubuntu
Thunderbird vulnerabilities2025-07-22
Ubuntu
Firefox vulnerabilities2025-03-06
Red Hat
firefox: Clickjacking the registerProtocolHandler info-bar Reporter2025-03-04
Debian
CVE-2025-1935: firefox - A web page could trick a user into setting that site as the default handler for ...2025
Mozilla
Mozilla Foundation Security Advisory 2025-17: CVE-2025-1935
CVE-2025-1935 — Cross-site Scripting in Mozilla Firefox | cvebase