CVE-2022-26485
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
22/12/2022
Last modified:
04/11/2025
Description
Removing an XSLT parameter during processing could have lead to an exploitable use-after-free. We have had reports of attacks in the wild abusing this flaw. This vulnerability affects Firefox
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* | 91.6.1 (excluding) | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* | 97.0.2 (excluding) | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:* | 97.3.0 (excluding) | |
| cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:*:*:* | 97.3.0 (excluding) | |
| cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* | 91.6.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://bugzilla.mozilla.org/show_bug.cgi?id=1758062
- https://www.mozilla.org/security/advisories/mfsa2022-09/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1758062
- https://www.mozilla.org/security/advisories/mfsa2022-09/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-26485



