ublockorigin CVE Vulnerabilities & Metrics

Focus on ublockorigin vulnerabilities and metrics.

Last updated: 29 Jun 2025, 22:25 UTC

About ublockorigin Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with ublockorigin. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total ublockorigin CVEs: 3
Earliest CVE date: 29 Apr 2019, 15:29 UTC
Latest CVE date: 02 May 2025, 21:15 UTC

Latest CVE reference: CVE-2025-4215

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical ublockorigin CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.8

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 1
4.0-6.9 2
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS ublockorigin CVEs

These are the five CVEs with the highest CVSS scores for ublockorigin, sorted by severity first and recency.

All CVEs for ublockorigin

CVE-2025-4215 ublockorigin vulnerability CVSS: 2.6 02 May 2025, 21:15 UTC

A vulnerability was found in gorhill uBlock Origin up to 1.63.3b16. It has been classified as problematic. Affected is the function currentStateChanged of the file src/js/1p-filters.js of the component UI. The manipulation leads to inefficient regular expression complexity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.63.3b17 is able to address this issue. The patch is identified as eaedaf5b10d2f7857c6b77fbf7d4a80681d4d46c. It is recommended to upgrade the affected component.

CVE-2021-36773 ublockorigin vulnerability CVSS: 5.0 18 Jul 2021, 04:15 UTC

uBlock Origin before 1.36.2 and nMatrix before 4.4.9 support an arbitrary depth of parameter nesting for strict blocking, which allows crafted web sites to cause a denial of service (unbounded recursion that can trigger memory consumption and a loss of all blocking functionality).

CVE-2019-11595 ublockorigin vulnerability CVSS: 6.8 29 Apr 2019, 15:29 UTC

In uBlock before 0.9.5.15, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.