Vulnerability Description
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2, Firefox ESR < 91.6.1, Firefox for Android < 97.3.0, Thunderbird < 91.6.2, and Focus < 97.3.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 91.6.1 |
| Mozilla | Firefox Focus | < 97.3.0 |
| Mozilla | Thunderbird | < 91.6.2 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1758062ExploitIssue TrackingVendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2022-09/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1758062ExploitIssue TrackingVendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2022-09/Vendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-US Government Resource
FAQ
What is CVE-2022-26485?
CVE-2022-26485 is a vulnerability with a CVSS score of 8.8 (HIGH). Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox < 97.0.2...
How severe is CVE-2022-26485?
CVE-2022-26485 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-26485?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Firefox Focus, Mozilla Thunderbird.