CVE-2025-11940

7.0 HIGH

📋 TL;DR

This vulnerability in LibreWolf's Windows installer allows local attackers to hijack the installation process through DLL search path manipulation. It affects LibreWolf users on Windows systems with vulnerable installer versions. Successful exploitation could lead to arbitrary code execution during installation.

💻 Affected Systems

Products:
  • LibreWolf
Versions: up to 143.0.4-1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations using the vulnerable installer. Linux and macOS versions are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM-level privileges by planting malicious DLLs that execute during LibreWolf installation, potentially leading to full system compromise.

🟠

Likely Case

Local user with limited privileges could escalate to higher privileges or execute arbitrary code in the context of the installer process.

🟢

If Mitigated

With proper user access controls and monitoring, impact is limited to local privilege escalation within the user's session.

🌐 Internet-Facing: LOW - This is a local attack requiring physical or remote desktop access to the target system.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this for privilege escalation or lateral movement.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploit requires local access and knowledge of the target system's directory structure. Attack complexity is high due to the need for precise DLL placement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 144.0-1

Vendor Advisory: https://codeberg.org/librewolf/bsys6/releases/tag/144.0-1

Restart Required: No

Instructions:

1. Download LibreWolf version 144.0-1 or later from official sources. 2. Uninstall any existing vulnerable versions. 3. Install the patched version. 4. Verify installation by checking version number.

🔧 Temporary Workarounds

Restrict installer execution

windows

Limit who can run the LibreWolf installer to trusted administrators only

Monitor DLL loading

windows

Enable auditing for DLL loading events in Windows Event Log

auditpol /set /subcategory:"Detailed Tracking" /success:enable /failure:enable

🧯 If You Can't Patch

  • Restrict local user access to systems where LibreWolf is installed
  • Implement application whitelisting to prevent unauthorized DLL execution

🔍 How to Verify

Check if Vulnerable:

Check LibreWolf version: Open LibreWolf → Help → About LibreWolf. If version is 143.0.4-1 or earlier, you are vulnerable.

Check Version:

librewolf --version

Verify Fix Applied:

After updating, verify version is 144.0-1 or later in Help → About LibreWolf.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event ID 4688 (process creation) for LibreWolf installer
  • DLL loading from unusual locations during installation

Network Indicators:

  • No network indicators - this is a local attack

SIEM Query:

EventID=4688 AND (ProcessName="setup.exe" OR ProcessName="librewolf-installer.exe") AND CommandLine LIKE "%librewolf%"

🔗 References

📤 Share & Export