CVE-2025-11713
📋 TL;DR
This vulnerability in Firefox and Thunderbird's 'Copy as cURL' feature allows insufficient escaping on Windows systems, potentially tricking users into executing malicious code. Attackers could craft malicious web content that, when copied as a cURL command, executes arbitrary commands on the victim's Windows machine. This affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4 on Windows only.
💻 Affected Systems
- Firefox
- Firefox ESR
- Thunderbird
📦 What is this software?
Firefox by Mozilla
Firefox by Mozilla
Thunderbird by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with user privileges, potentially leading to full system compromise, data theft, or ransomware deployment.
Likely Case
Limited code execution in user context, potentially stealing credentials, installing malware, or accessing local files.
If Mitigated
No impact if systems are patched or users avoid copying untrusted cURL commands from suspicious sources.
🎯 Exploit Status
Exploitation requires social engineering to trick users into copying and executing malicious cURL commands. No authentication needed, but user interaction is required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 144+, Firefox ESR 140.4+, Thunderbird 144+, Thunderbird 140.4+
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-81/
Restart Required: Yes
Instructions:
1. Open Firefox/Thunderbird. 2. Click menu > Help > About Firefox/Thunderbird. 3. Allow automatic update or download latest version from mozilla.org. 4. Restart browser/email client.
🔧 Temporary Workarounds
Disable 'Copy as cURL' feature
windowsRemove or disable the 'Copy as cURL' context menu option via browser settings or extensions.
User awareness training
allEducate users to avoid copying and executing cURL commands from untrusted websites or emails.
🧯 If You Can't Patch
- Switch to non-Windows operating systems (Linux/macOS) where this vulnerability does not exist.
- Use alternative browsers/email clients that are not affected by this specific vulnerability.
🔍 How to Verify
Check if Vulnerable:
Check browser/email client version: Firefox/Thunderbird < 144 or ESR < 140.4 on Windows indicates vulnerability.
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Confirm version is Firefox 144+, Firefox ESR 140.4+, Thunderbird 144+, or Thunderbird 140.4+.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution events in Windows Event Logs (Security/System)
- Browser/email client crash reports related to cURL feature
Network Indicators:
- Suspicious cURL commands in proxy logs with unexpected parameters or shell metacharacters
SIEM Query:
EventID=4688 AND CommandLine LIKE '%curl%' AND (ParentImage LIKE '%firefox%' OR ParentImage LIKE '%thunderbird%')