๐Ÿ” CVE Alert

CVE-2025-3875

HIGH 7.5

Sender Spoofing via Malformed From Header in Thunderbird

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.

Vendor mozilla
Product thunderbird
Ecosystems
Industries
Technology
Published May 14, 2025
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mozilla thunderbird

Be the first to know when new high vulnerabilities affecting mozilla thunderbird are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Mozilla / Thunderbird
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1950629 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-34/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-35/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00022.html

Credits

xh4vm