Mozilla this week patched several high-severity vulnerabilities in its Firefox and Thunderbird products.
Firefox 104 — as well as Firefox ESR 91.13 and 102.2 — patches a high-severity address bar spoofing issue related to XSLT error handling. The flaw, tracked as CVE-2022-38472, could be exploited for phishing.
The latest Firefox release also resolves CVE-2022-38473, an issue related to cross-origin XSLT documents that could pose security and privacy risks.
“A cross-origin iframe referencing an XSLT document would inherit the parent domain’s permissions (such as microphone or camera access),” Mozilla explained in its advisory.
Both vulnerabilities were reported to Mozilla by researcher Armin Ebert.
Another microphone-related issue patched in Firefox is CVE-2022-38474. On Android, a website with permission to access the microphone could record audio without displaying a notification. Since it does not actually allow an attacker to bypass the permission prompt, the flaw only has a severity rating of ‘low’.
In addition, two CVE identifiers, CVE-2022-38477 and CVE-2022-38478, have been assigned to multiple memory safety bugs that could lead to arbitrary code execution.
Most of these vulnerabilities have also been fixed in Thunderbird. Mozilla said the flaws cannot be exploited through emails in Thunderbird because scripting is disabled, but noted that they represent “potential risks in browser or browser-like contexts”.
The US Cybersecurity and Infrastructure Security Agency (CISA) has advised organizations to review Mozilla’s advisories and install the necessary patches.
While currently Chrome appears to be the most targeted web browser, threat actors have not ignored Firefox. In March, Mozilla issued an emergency update to fix two actively exploited zero-days.
Data collected by Google and CISA shows that roughly ten Firefox vulnerabilities have been exploited in the wild over the past decade.
Related: Google Attempts to Explain Surge in Chrome Zero-Day Exploitation
Related: Mozilla Patches Firefox Zero-Day Exploited in Targeted Attacks
Related: Mozilla Patches Two Firefox Vulnerabilities Exploited in Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
Latest News
- Backslash Snags $8M Seed Financing for AppSec Tech
- ‘Badsecrets’ Open Source Tool Detects Secrets in Many Web Frameworks
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- Chrome 111 Update Patches High-Severity Vulnerabilities
- BreachForums Shut Down Over Law Enforcement Takeover Concerns
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Malware Trends: What’s Old Is Still New
- Burnout in Cybersecurity – Can It Be Prevented?
