CVE-2025-3522

EUVD-2025-10965
Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to  determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CISA-ADPADP
6.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 45%
Affected Products (NVD)
VendorProductVersion
mozillathunderbird
𝑥
< 128.9.2
mozillathunderbird
129.0 ≤
𝑥
< 137.0.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
thunderbird
bookworm
1:140.6.0esr-1~deb12u1
fixed
bookworm (security)
1:140.8.0esr-1~deb12u1
fixed
bullseye
vulnerable
bullseye (security)
1:140.8.0esr-1~deb11u1
fixed
forky
1:140.8.0esr-1
fixed
sid
1:140.8.0esr-1
fixed
trixie
1:140.6.0esr-1~deb13u1
fixed
trixie (security)
1:140.8.0esr-1~deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
thunderbird
focal
dne
jammy
Fixed 1:128.12.0+build1-0ubuntu0.22.04.1
released
noble
not-affected
oracular
not-affected
plucky
not-affected