A security researcher from Positive Technologies, Daniil Satyaev of the PT SWARM team, has discovered a vulnerability in Mozilla Firefox, one of the world's most popular1 browsers. The vulnerability also affects the enterprise version of Firefox. By exploiting this flaw via malicious code injected into a compromised website, attackers could steal credentials or redirect users to phishing sites. Mozilla was notified under the responsible disclosure policy and has already released security updates for Firefox and Firefox ESR.
The vulnerability, tracked as PT-2025-304872 (CVE-2025-6430, BDU:2025-07582), received a CVSS 4.0 score of 6.1. It affects all Firefox versions earlier than 140.0, as well as Firefox ESR versions earlier than 128.12. According to Mozilla, the issue also extended to two release branches of the Thunderbird email client—versions below 140 and 128.12—which have also received patches.
If exploited together with a cross-site scripting (XSS)3 vulnerability, this flaw could allow attackers to:
- Access internal systems such as document management or CRM platforms, potentially exposing confidential business information and financial data.
- Compromise user credentials, including those of network administrators, disrupting the organization's operations.
- Redirect users to phishing sites to steal their credentials.
1 According to the web analytics platform StatCounter, Mozilla is the fourth most popular browser in the world. The vendor estimates the browser's user base at 150 million people.
2 The security vulnerability has been registered on the dbugs portal, which aggregates data on vulnerabilities in software and hardware from vendors around the world.
3 A website security vulnerability that allows an attacker to inject malicious code into a web page.