Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-11713— Potential user-assisted code execution in “Copy as cURL” command

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-11713

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Potential user-assisted code execution in “Copy as cURL” command
Source: NVD (National Vulnerability Database)
Vulnerability Description
Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla Firefox和Mozilla Thunderbird 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mozilla Firefox和Mozilla Thunderbird都是美国Mozilla基金会的产品。Mozilla Firefox是一款开源Web浏览器。Mozilla Thunderbird是一套从Mozilla Application Suite独立出来的电子邮件客户端软件。该软件支持IMAP、POP邮件协议以及HTML邮件格式。 Mozilla Firefox和Mozilla Thunderbird存在安全漏洞,该漏洞源于Copy as cURL功能转义不足,可能导致执行意外代码。以下产品及版
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MozillaFirefox 140.4 ~ 140.* -
MozillaThunderbird 140.4 ~ 140.* -

II. Public POCs for CVE-2025-11713

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-11713

登录查看更多情报信息。

Same Patch Batch · Mozilla · 2025-10-14 · 14 CVEs total

CVE-2025-11711Some non-writable Object properties could be modified
CVE-2025-11710Cross-process information leaked due to malicious IPC messages
CVE-2025-11709Out of bounds read/write in a privileged process triggered by WebGL textures
CVE-2025-11714Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4,
CVE-2025-11708Use-after-free in MediaTrackGraphImpl::GetInstance()
CVE-2025-11715Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thun
CVE-2025-11712An OBJECT tag type attribute overrode browser behavior on web resources without a content-
CVE-2025-11721Memory safety bug fixed in Firefox 144 and Thunderbird 144
CVE-2025-11719Use-after-free caused by the native messaging web extension API on Windows
CVE-2025-11716Sandboxed iframes allowed links to open in external apps (Android only)
CVE-2025-11720Spoofing risk in Android custom tabs
CVE-2025-11717The password edit screen was not hidden in Android card view
CVE-2025-11718Address bar could be spoofed on Android using visibilitychange

IV. Related Vulnerabilities

V. Comments for CVE-2025-11713

No comments yet


Leave a comment