CVE-2025-1015

The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the Other field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.
Cross-site Scripting
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
mozillaCNA
---
---
CISA-ADPADP
5.4 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
VendorProductVersion
mozillathunderbird
128.0.1 ≤
𝑥
< 128.7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
thunderbird
bullseye
vulnerable
bullseye (security)
1:128.11.0esr-1~deb11u1
fixed
bookworm
1:128.10.0esr-1~deb12u1
fixed
bookworm (security)
1:128.10.1esr-1~deb12u1
fixed
trixie
1:128.10.0esr-1
fixed
sid
1:128.11.0esr-1
fixed