Cross-site Request Forgery (CSRF) Affecting Firefox-ESR package, versions [,128.12)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-FIREFOXESR-10558117
  • published27 Jun 2025
  • disclosed24 Jun 2025
  • creditpwn2car

Introduced: 24 Jun 2025

NewCVE-2025-6426  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade Firefox-ESR to version 128.12 or higher.

Overview

Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) in the process of opening files with a terminal extension on macOS. An attacker can trick users into executing potentially harmful files by bypassing expected security warnings.

CVSS Base Scores

version 4.0
version 3.1