CVE-2025-4083
Process isolation bypass using "javascript:" URI links in cross-origin frames
CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | Apr 29, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new critical vulnerabilities affecting mozilla firefox are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-28/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-29/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-30/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-31/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-32/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html
Credits
Nika Layzell