Potential user-assisted code execution in “Copy as cURL” command
Summary
| CVE | CVE-2025-11713 |
|---|---|
| State | PUBLISHED |
| Assigner | mozilla |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-10-14 13:15:37 UTC |
| Updated | 2026-04-13 15:16:40 UTC |
| Description | Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4. |
Risk And Classification
Primary CVSS: v3.1 8.1 HIGH from ADP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Problem Types: CWE-116 | CWE-116 CWE-116 Improper Encoding or Escaping of Output
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | ADP | DECLARED | 8.1 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 8.1 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Mozilla | Firefox | unaffected 140.4 140.* rpm | Not specified |
| CNA | Mozilla | Firefox | unaffected 144 * rpm | Not specified |
| CNA | Mozilla | Thunderbird | unaffected 140.4 140.* rpm | Not specified |
| CNA | Mozilla | Thunderbird | unaffected 144 * rpm | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| bugzilla.mozilla.org/show_bug.cgi | [email protected] | bugzilla.mozilla.org | Issue Tracking, Permissions Required |
| www.mozilla.org/security/advisories/mfsa2025-84 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2025-85 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2025-83 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2025-81 | [email protected] | www.mozilla.org | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Hafiizh & kang ali (en)
There are currently no legacy QID mappings associated with this CVE.