๐Ÿ” CVE Alert

CVE-2025-8029

HIGH 8.1

javascript: URLs executed on object and embed tags

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.

Vendor mozilla
Product firefox
Ecosystems
Industries
Technology
Published Jul 22, 2025
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for mozilla firefox

Be the first to know when new high vulnerabilities affecting mozilla firefox are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Mozilla / Firefox
All versions affected
Mozilla / Thunderbird
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
bugzilla.mozilla.org: https://bugzilla.mozilla.org/show_bug.cgi?id=1928021 mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-56/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-58/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-59/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-61/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-62/ mozilla.org: https://www.mozilla.org/security/advisories/mfsa2025-63/ lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/07/msg00016.html

Credits

Mirko Brodesser