๐Ÿ” CVE Alert

CVE-2025-4083

CRITICAL 9.1

Process isolation bypass using "javascript:" URI links in cross-origin frames

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.

Vendor mozilla
Product firefox
Ecosystems
Industries
Technology
Published Apr 29, 2025
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mozilla firefox

Be the first to know when new critical vulnerabilities affecting mozilla firefox are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Mozilla / Firefox
All versions affected
Mozilla / Thunderbird
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-28/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-29/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-30/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-31/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-32/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html

Credits

Nika Layzell