{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-5264","assignerOrgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","state":"PUBLISHED","assignerShortName":"mozilla","dateReserved":"2025-05-27T12:29:23.106Z","datePublished":"2025-05-27T12:29:23.513Z","dateUpdated":"2026-04-13T14:27:58.589Z"},"containers":{"cna":{"affected":[{"product":"Firefox","vendor":"Mozilla","versions":[{"status":"unaffected","version":"115.24","lessThanOrEqual":"115.*","versionType":"rpm"},{"status":"unaffected","version":"128.11","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"139","lessThanOrEqual":"*","versionType":"rpm"}]},{"product":"Thunderbird","vendor":"Mozilla","versions":[{"status":"unaffected","version":"128.11","lessThanOrEqual":"128.*","versionType":"rpm"},{"status":"unaffected","version":"139","lessThanOrEqual":"*","versionType":"rpm"}]}],"descriptions":[{"lang":"en","value":"Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.","supportingMedia":[{"type":"text/html","base64":false,"value":"Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11."}]}],"title":"Potential local code execution in “Copy as cURL” command","references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1950001"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-42/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-43/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-44/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-45/"},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-46/"}],"credits":[{"lang":"en","value":"Ameen Basha M K"}],"providerMetadata":{"orgId":"f16b083a-5664-49f3-a51e-8d479e5ed7fe","shortName":"mozilla","dateUpdated":"2026-04-13T14:27:58.589Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.8,"attackVector":"LOCAL","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"REQUIRED","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"LOW","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"id":"CVE-2025-5264","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-05-28T03:55:59.370030Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-77","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T18:27:56.150Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00046.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00043.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:05:59.028Z"}}]}}