CVE-2025-11940
📋 TL;DR
This vulnerability in LibreWolf's Windows installer allows local attackers to hijack the installation process through DLL search path manipulation. It affects LibreWolf users on Windows systems with vulnerable installer versions. Successful exploitation could lead to arbitrary code execution during installation.
💻 Affected Systems
- LibreWolf
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains SYSTEM-level privileges by planting malicious DLLs that execute during LibreWolf installation, potentially leading to full system compromise.
Likely Case
Local user with limited privileges could escalate to higher privileges or execute arbitrary code in the context of the installer process.
If Mitigated
With proper user access controls and monitoring, impact is limited to local privilege escalation within the user's session.
🎯 Exploit Status
Exploit requires local access and knowledge of the target system's directory structure. Attack complexity is high due to the need for precise DLL placement.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 144.0-1
Vendor Advisory: https://codeberg.org/librewolf/bsys6/releases/tag/144.0-1
Restart Required: No
Instructions:
1. Download LibreWolf version 144.0-1 or later from official sources. 2. Uninstall any existing vulnerable versions. 3. Install the patched version. 4. Verify installation by checking version number.
🔧 Temporary Workarounds
Restrict installer execution
windowsLimit who can run the LibreWolf installer to trusted administrators only
Monitor DLL loading
windowsEnable auditing for DLL loading events in Windows Event Log
auditpol /set /subcategory:"Detailed Tracking" /success:enable /failure:enable
🧯 If You Can't Patch
- Restrict local user access to systems where LibreWolf is installed
- Implement application whitelisting to prevent unauthorized DLL execution
🔍 How to Verify
Check if Vulnerable:
Check LibreWolf version: Open LibreWolf → Help → About LibreWolf. If version is 143.0.4-1 or earlier, you are vulnerable.
Check Version:
librewolf --version
Verify Fix Applied:
After updating, verify version is 144.0-1 or later in Help → About LibreWolf.
📡 Detection & Monitoring
Log Indicators:
- Windows Event ID 4688 (process creation) for LibreWolf installer
- DLL loading from unusual locations during installation
Network Indicators:
- No network indicators - this is a local attack
SIEM Query:
EventID=4688 AND (ProcessName="setup.exe" OR ProcessName="librewolf-installer.exe") AND CommandLine LIKE "%librewolf%"
🔗 References
- https://codeberg.org/librewolf/bsys6/commit/dd10e31dd873e9cb309fad8aed921d45bf905a55
- https://codeberg.org/librewolf/bsys6/releases/tag/144.0-1
- https://github.com/Cyber-Wo0dy/report/blob/main/librewolf/143.0.4-1/librewolf_installer_exe_hijacking.md
- https://vuldb.com/?ctiid.329019
- https://vuldb.com/?id.329019
- https://vuldb.com/?submit.671575
- https://github.com/Cyber-Wo0dy/report/blob/main/librewolf/143.0.4-1/librewolf_installer_exe_hijacking.md
- https://vuldb.com/?submit.671575