Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-5264.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.24.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "139.0"
}
]
},
{
"events": [
{
"introduced": "116.0"
},
{
"fixed": "128.11.0"
}
]
}
]