CVE Vulnerabilities

CVE-2025-10529

Permissive Cross-domain Security Policy with Untrusted Domains

Published: Sep 16, 2025 | Modified: Sep 19, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.1 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Ubuntu
MEDIUM

This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.

Weakness

The product uses a web-client protection mechanism such as a Content Security Policy (CSP) or cross-domain policy file, but the policy includes untrusted domains with which the web client is allowed to communicate.

Affected Software

Name Vendor Start Version End Version
Firefox Mozilla * 140.3.0 (excluding)
Firefox Mozilla * 143.0 (excluding)
Thunderbird Mozilla * 143.0 (excluding)
Red Hat Enterprise Linux 10 RedHat firefox-0:140.3.0-1.el10_0 *
Red Hat Enterprise Linux 10 RedHat thunderbird-0:140.3.0-1.el10_0 *
Red Hat Enterprise Linux 7 Extended Lifecycle Support RedHat firefox-0:140.3.0-1.el7_9 *
Red Hat Enterprise Linux 8 RedHat firefox-0:140.3.0-1.el8_10 *
Red Hat Enterprise Linux 8 RedHat thunderbird-0:140.3.0-1.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat thunderbird-0:140.3.0-1.el8_2 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat firefox-0:140.3.0-1.el8_2 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat thunderbird-0:140.3.0-1.el8_4 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat firefox-0:140.3.0-1.el8_4 *
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On RedHat thunderbird-0:140.3.0-1.el8_4 *
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On RedHat firefox-0:140.3.0-1.el8_4 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat thunderbird-0:140.3.0-1.el8_6 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat firefox-0:140.3.0-1.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat thunderbird-0:140.3.0-1.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat firefox-0:140.3.0-1.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat thunderbird-0:140.3.0-1.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat firefox-0:140.3.0-1.el8_6 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat thunderbird-0:140.3.0-1.el8_8 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat firefox-0:140.3.0-1.el8_8 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat thunderbird-0:140.3.0-1.el8_8 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat firefox-0:140.3.0-1.el8_8 *
Red Hat Enterprise Linux 9 RedHat firefox-0:140.3.0-1.el9_6 *
Red Hat Enterprise Linux 9 RedHat thunderbird-0:140.3.0-1.el9_6 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat thunderbird-0:140.3.0-1.el9_0 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat firefox-0:140.3.0-1.el9_0 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat thunderbird-0:140.3.0-1.el9_2 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat firefox-0:140.3.0-1.el9_2 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat thunderbird-0:140.3.0-1.el9_4 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat firefox-0:140.3.0-1.el9_4 *
Mozjs102 Ubuntu esm-apps/noble *
Mozjs102 Ubuntu jammy *
Mozjs102 Ubuntu noble *
Mozjs115 Ubuntu devel *
Mozjs115 Ubuntu noble *
Mozjs115 Ubuntu plucky *
Mozjs115 Ubuntu questing *
Mozjs52 Ubuntu esm-apps/focal *
Mozjs52 Ubuntu esm-infra/bionic *
Mozjs68 Ubuntu esm-infra/focal *
Mozjs78 Ubuntu esm-apps/jammy *
Mozjs78 Ubuntu jammy *
Mozjs91 Ubuntu jammy *
Thunderbird Ubuntu jammy *

Extended Description

If a cross-domain policy file includes domains that should not be trusted, such as when using wildcards under a high-level domain, then the application could be attacked by these untrusted domains. In many cases, the attack can be launched without the victim even being aware of it.

Potential Mitigations

References