CVE-2025-5264

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-5264
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-5264.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-5264
Downstream
Related
Published
2025-05-27T13:15:22Z
Modified
2025-08-09T20:01:26Z
Summary
[none]
Details

Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.

References

Affected packages