Home LadybirdBrowser CVE-2025-47154
Back to LadybirdBrowser

CVE-2025-47154

Ladybird - LibJS

LadybirdBrowser CVSS 9 Updated April 6, 2026

Executive Risk Summary

"A use-after-free vulnerability in Ladybird's LibJS component allows remote attackers to execute arbitrary code via a crafted .js file. This vulnerability can be exploited by an unauthenticated attacker, potentially leading to code execution on the affected system."

Anticipated Attack Path

  1. 1. Step 1: Craft a malicious .js file
  2. 2. Step 2: Deliver the malicious file to the target system
  3. 3. Step 3: Exploit the use-after-free vulnerability to execute arbitrary code

Am I Vulnerable?

  • Verify the presence of the LibJS component in the Ladybird browser
  • Check for the existence of a crafted .js file on the system
  • Monitor system logs for suspicious activity related to the Ladybird browser

Operational Audit Arsenal

Target Type binary
Target Asset libjs
Standard Path /path/to/ladybird/browser/libjs

Manual Verification Required

This is a non-Windows asset (LadybirdBrowser). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only affects the LibJS component

Internal Work Notes

Use-after-free vulnerability in Ladybird's LibJS component, allowing remote code execution via crafted .js file. Apply patch f5a670421954fc7130c3685b713c621b29516669 to mitigate the vulnerability.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.