An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.
History

Tue, 15 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 21 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
Vendors & Products Mozilla firefox Esr

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2025-04-15T16:50:13.366Z

Reserved: 2022-08-19T00:00:00.000Z

Link: CVE-2022-38472

cve-icon Vulnrichment

Updated: 2024-08-03T10:54:03.688Z

cve-icon NVD

Status : Modified

Published: 2022-12-22T20:15:36.237

Modified: 2025-04-15T17:15:36.150

Link: CVE-2022-38472

cve-icon Redhat

Severity : Important

Publid Date: 2022-08-23T00:00:00Z

Links: CVE-2022-38472 - Bugzilla