CVE-2025-1009

9.8 CRITICAL

📋 TL;DR

A use-after-free vulnerability in Firefox and Thunderbird allows attackers to cause potentially exploitable crashes via crafted XSLT data. This affects Firefox versions below 135 and specific ESR versions, plus Thunderbird versions below 128.7 and 135. Successful exploitation could lead to arbitrary code execution.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Firefox ESR
  • Mozilla Thunderbird
Versions: Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, Thunderbird < 135
Operating Systems: Windows, Linux, macOS, Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. XSLT processing is enabled by default in affected browsers/email clients.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the browser/email client user, potentially leading to full system compromise.

🟠

Likely Case

Browser/application crash leading to denial of service, with potential for code execution if combined with other vulnerabilities.

🟢

If Mitigated

Limited to denial of service if sandboxing and other browser security features prevent full exploitation.

🌐 Internet-Facing: HIGH - Attackers can exploit via malicious web pages or emails without user interaction beyond visiting/opening.
🏢 Internal Only: MEDIUM - Requires user to visit malicious internal sites or open crafted emails, but internal threats exist.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious XSLT data, but no public proof-of-concept has been released. The high CVSS score suggests reliable exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 135+, Firefox ESR 115.20+, Firefox ESR 128.7+, Thunderbird 128.7+, Thunderbird 135+

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-07/

Restart Required: Yes

Instructions:

1. Open Firefox/Thunderbird. 2. Click menu → Help → About Firefox/Thunderbird. 3. Allow automatic update check and installation. 4. Restart the application when prompted.

🔧 Temporary Workarounds

Disable XSLT processing

all

Disables XSLT transformation functionality in Firefox/Thunderbird to prevent exploitation.

about:config → Set 'dom.xslt.enabled' to false

🧯 If You Can't Patch

  • Restrict access to untrusted websites and email sources
  • Implement application whitelisting to prevent execution of malicious code

🔍 How to Verify

Check if Vulnerable:

Check browser/email client version against affected versions list.

Check Version:

Firefox/Thunderbird: about:support → Application Basics → Version

Verify Fix Applied:

Confirm version is equal to or higher than patched versions: Firefox ≥135, Firefox ESR ≥115.20 or ≥128.7, Thunderbird ≥128.7 or ≥135.

📡 Detection & Monitoring

Log Indicators:

  • Browser/email client crash logs with XSLT-related stack traces
  • Unexpected process termination events

Network Indicators:

  • Requests to domains serving XSLT content
  • Unusual outbound connections after visiting sites with XSLT

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="firefox.exe" OR ProcessName="thunderbird.exe" AND Keywords contains "XSLT"

🔗 References

📤 Share & Export