{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T20:33:36.635","vulnerabilities":[{"cve":{"id":"CVE-2025-4085","sourceIdentifier":"security@mozilla.org","published":"2025-04-29T14:15:35.187","lastModified":"2026-04-13T15:16:59.873","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker with control over a content process could potentially leverage the privileged UITour actor to leak sensitive information or escalate privileges. This vulnerability was fixed in Firefox 138 and Thunderbird 138."},{"lang":"es","value":"Un atacante con control sobre un proceso de contenido podría aprovechar el actor privilegiado UITour para filtrar información confidencial o escalar privilegios. Esta vulnerabilidad afecta a Firefox (versión anterior a la 138) y Thunderbird (versión anterior a la 138)."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:L\/A:N","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":4.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*","versionEndExcluding":"138.0","matchCriteriaId":"EB8A8C7B-B65D-4DF5-BDB5-0C3C4E2DB72C"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*","versionEndExcluding":"138.0","matchCriteriaId":"D1E8CCF1-4E91-44CC-A652-B23D1337A485"}]}]}],"references":[{"url":"https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1915280","source":"security@mozilla.org","tags":["Permissions Required"]},{"url":"https:\/\/www.mozilla.org\/security\/advisories\/mfsa2025-28\/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https:\/\/www.mozilla.org\/security\/advisories\/mfsa2025-31\/","source":"security@mozilla.org","tags":["Vendor Advisory"]}]}}]}