Vulnerability Description
Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 140.4.0 |
| Mozilla | Thunderbird | < 140.4.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1986142Issue TrackingPermissions Required
- https://www.mozilla.org/security/advisories/mfsa2025-81/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-83/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-84/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-85/Vendor Advisory
FAQ
What is CVE-2025-11713?
CVE-2025-11713 is a vulnerability with a CVSS score of 8.1 (HIGH). Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating ...
How severe is CVE-2025-11713?
CVE-2025-11713 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-11713?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird.