Access Control Bypass Affecting Firefox package, versions [,136)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Access Control Bypass vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-FIREFOX-9376932
  • published10 Mar 2025
  • disclosed4 Mar 2025
  • creditHafiizh

Introduced: 4 Mar 2025

NewCVE-2025-1935  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Firefox to version 136 or higher.

Overview

Affected versions of this package are vulnerable to Access Control Bypass via the default handler setting for a custom URL protocol. An attacker can manipulate this setting to redirect users or execute unwanted actions on their system by convincing the user to visit a malicious web page.

CVSS Base Scores

version 4.0
version 3.1