CVE-2025-2830

EUVD-2025-10970
By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability was fixed in Thunderbird 137.0.2 and Thunderbird 128.9.2.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
mozillathunderbird
𝑥
< 128.9.2
mozillathunderbird
129.0 ≤
𝑥
< 137.0.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
thunderbird
bookworm
1:140.6.0esr-1~deb12u1
fixed
bookworm (security)
1:140.9.1esr-1~deb12u1
fixed
bullseye
vulnerable
bullseye (security)
1:140.9.1esr-1~deb11u1
fixed
forky
1:140.9.0esr-1
fixed
sid
1:140.9.1esr-1
fixed
trixie
1:140.8.0esr-1~deb13u1
fixed
trixie (security)
1:140.9.1esr-1~deb13u1
fixed