Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-27425— QR code user confirmation bypass with invalid protocol

EPSS 0.31% · P54
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-27425

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
QR code user confirmation bypass with invalid protocol
Source: NVD (National Vulnerability Database)
Vulnerability Description
Scanning certain QR codes that included text with a website URL could allow the URL to be opened without presenting the user with a confirmation alert first. This vulnerability was fixed in Firefox for iOS 136.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla Firefox 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mozilla Firefox是美国Mozilla基金会的一款开源Web浏览器。 Mozilla Firefox 136之前版本存在授权问题漏洞,该漏洞源于未确认QR码链接。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MozillaFirefox for iOS 136 ~ * -

II. Public POCs for CVE-2025-27425

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-27425

登录查看更多情报信息。

Same Patch Batch · Mozilla · 2025-03-04 · 17 CVEs total

CVE-2025-27426Firefox Mobile iOS Full Address Bar Spoof Using Server-Side Redirect to internal error pag
CVE-2025-27424Firefox Mobile iOS Address Bar Spoof Using Server-Side Redirect to non-http Scheme
CVE-2025-1943Memory safety bugs fixed in Firefox 136 and Thunderbird 136
CVE-2025-1937Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR
CVE-2025-1938Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbi
CVE-2025-1935Clickjacking the registerProtocolHandler info-bar
CVE-2025-1942Disclosure of uninitialized memory when .toUpperCase() causes string to get longer
CVE-2025-1936Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents
CVE-2025-1941Lock screen setting bypass in Firefox Focus for Android
CVE-2025-1934Unexpected GC during RegExp bailout processing
CVE-2025-1932Inconsistent comparator in XSLT sorting led to out-of-bounds access
CVE-2025-1940Android Intent confirmation prompt tapjacking using Select options
CVE-2025-1933JIT corruption of WASM i32 return values on 64-bit CPUs
CVE-2025-1931Use-after-free in WebTransportChild
CVE-2025-1939Tapjacking in Android Custom Tabs using transition animations
CVE-2025-1930AudioIPC StreamData could trigger a use-after-free in the Browser process

IV. Related Vulnerabilities

V. Comments for CVE-2025-27425

No comments yet


Leave a comment