Vulnerability Description
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability was fixed in Firefox 137, Firefox ESR 115.22, Firefox ESR 128.9, Thunderbird 137, and Thunderbird 128.9.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 115.22.0 |
| Mozilla | Thunderbird | < 128.9.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1941002ExploitPermissions Required
- https://www.mozilla.org/security/advisories/mfsa2025-20/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-21/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-22/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-23/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-24/Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/04/msg00005.html
FAQ
What is CVE-2025-3028?
CVE-2025-3028 is a vulnerability with a CVSS score of 6.5 (MEDIUM). JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability was fixed in Firefox 137, Firefox ESR 115.22, Firefox ESR 128.9, Thunder...
How severe is CVE-2025-3028?
CVE-2025-3028 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-3028?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird.