CVE-2025-3875
Sender Spoofing via Malformed From Header in Thunderbird
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
| Vendor | mozilla |
| Product | thunderbird |
| Ecosystems | |
| Industries | Technology |
| Published | May 14, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla thunderbird
Be the first to know when new high vulnerabilities affecting mozilla thunderbird are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Mozilla / Thunderbird
All versions affected References
Credits
xh4vm