πŸ” CVE Alert

CVE-2025-3909

HIGH 8.1

JavaScript Execution via Spoofed PDF Attachment and file:/// Link

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as HTML when opened, allowing the embedded JavaScript to run without requiring a file download. This behavior relies on Thunderbird auto-saving the attachment to /tmp and linking to it via the file:/// protocol, potentially enabling JavaScript execution as part of the HTML. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.

Vendor mozilla
Product thunderbird
Ecosystems
Industries
Technology
Published May 14, 2025
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mozilla thunderbird

Be the first to know when new high vulnerabilities affecting mozilla thunderbird are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

Mozilla / Thunderbird
All versions affected

References

NVD β†— CVE.org β†— EPSS Data β†—
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1958376 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-34/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-35/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00022.html

Credits

Dario Weißer