CVE-2025-1931
Description
It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability was fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A use-after-free in WebTransportChild::RecvRemoteClosed could be triggered, leading to a potentially exploitable crash in Firefox and Thunderbird.
Vulnerability
A use-after-free vulnerability exists in the content process side of a WebTransport connection, specifically in the WebTransportChild::RecvRemoteClosed handler. When a WebTransport connection is closed, the code could attempt to access memory that had already been freed, leading to a crash. This issue was discovered by security researcher sherkito and reported as Mozilla bug 1944126 [1].
Exploitation
To exploit this vulnerability, an attacker would need to establish a WebTransport connection with a target user and then trigger a race condition or specific sequence of events that causes the use-after-free. The attack could be carried out from a compromised content process or a specially crafted webpage. No authentication is required beyond the ability to establish a WebTransport connection [1][2].
Impact
If successfully exploited, this vulnerability could lead to a potentially exploitable crash of the content process. In the context of Firefox, this could allow an attacker to cause a denial of service or potentially execute arbitrary code within the content process. For Thunderbird, the advisory notes that many such flaws cannot be exploited through email because scripting is disabled when reading mail, but are potentially risks in browser-like contexts [3][4].
Mitigation
The vulnerability is fixed in Firefox 136, Firefox ESR 115.21, Firefox ESR 128.8, Thunderbird 136, and Thunderbird 128.8. Users should update their software to these versions or later to protect against this vulnerability [2][3][4].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
31cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*range: <136.0
- cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*range: <115.21.0
- (no CPE)range: <136
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*range: <128.8.0
- (no CPE)range: <136, <128.8
- Range: <115.21, <128.8
- osv-coords25 versionspkg:rpm/almalinux/firefoxpkg:rpm/almalinux/firefox-x11pkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/mozjs128&distro=openSUSE%20Tumbleweedpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP6pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6
< 128.8.0-1.el9_5+ 24 more
- (no CPE)range: < 128.8.0-1.el9_5
- (no CPE)range: < 128.8.0-1.el9_5
- (no CPE)range: < 128.8.0-1.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 136.0-1.1
- (no CPE)range: < 128.8.0-150200.8.203.1
- (no CPE)range: < 128.8.0-1.1
- (no CPE)range: < 128.8.1-1.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-112.249.3
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-150200.152.173.1
- (no CPE)range: < 128.8.0-112.249.3
- (no CPE)range: < 128.8.0-150200.8.203.1
- (no CPE)range: < 128.8.0-150200.8.203.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.mozilla.org/security/advisories/mfsa2025-14/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-15/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-16/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-17/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-18/nvdVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue Tracking
- lists.debian.org/debian-lts-announce/2025/03/msg00006.htmlnvd
News mentions
0No linked articles in our index yet.