Two independent researchers outlined the vulnerability in a presentation over the weekend at the ToorCon hacker conference.
The pair claimed that the vulnerability could allow attackers to take control of a system through a specially crafted web page.
Snyder did not confirm that the flaw could be exploited to allow remote code execution.
The vulnerability affects the 'chrome context' component of Firefox, according to Eric Sites, vice president of research and development at security vendor Sunbelt Software.
"If a script gets into that chrome context, then it's just like you copied that script to your computer and ran it with no restrictions whatsoever."
Although there are no known exploits of the vulnerability, Sites warned that the flaw could be included in the WebAttacker toolkit which provides malware authors with an automated tool to craft new worms and viruses.
Sites compared the impact of the Firefox vulnerability to the ActiveX software zero-day exploits that hit Microsoft's Internet Explorer in the past week.
In two separate incidents, attackers used an unpatched vulnerability in Explorer to execute arbitrary code. Microsoft rushed out a patch for the VML flaws last week, but the ActiveX flaw remains unpatched.
The open source status of Firefox allows its developer community to quickly create a patch once a solution has been found, but Sites warned that the vulnerability is still "pretty dangerous" to users.
"One thing that Mozilla has going for it is an interesting framework that allows for sending out updates very quickly," he said.
Trump proposes a $1.3bn fine and a round of firings to un-bork ZTE
Findings could mean new optical frequencies to transmit more data along optical cables
Findings made by reconstructing its orbit by numerical simulation
3D printer was specially adapted to build therapeutic biomaterials from multiple materials