CVE-2025-8029
javascript: URLs executed on object and embed tags
CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th
Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
| Vendor | mozilla |
| Product | firefox |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 22, 2025 |
| Last Updated | Apr 13, 2026 |
Stay Ahead of the Next One
Get instant alerts for mozilla firefox
Be the first to know when new high vulnerabilities affecting mozilla firefox are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Mozilla / Firefox
All versions affected Mozilla / Thunderbird
All versions affected References
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1928021 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-56/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-58/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-59/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-61/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-62/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-63/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/07/msg00016.html
Credits
Mirko Brodesser