CVE-2025-3909

EUVD-2025-14935
Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as HTML when opened, allowing the embedded JavaScript to run without requiring a file download. This behavior relies on Thunderbird auto-saving the attachment to /tmp and linking to it via the file:/// protocol, potentially enabling JavaScript execution as part of the HTML. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
mozillathunderbird
𝑥
< 128.10.1
mozillathunderbird
129.0 ≤
𝑥
< 138.0.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
thunderbird
bookworm
1:140.6.0esr-1~deb12u1
fixed
bookworm (security)
1:140.9.1esr-1~deb12u1
fixed
bullseye
vulnerable
bullseye (security)
1:140.9.1esr-1~deb11u1
fixed
forky
1:140.9.0esr-1
fixed
sid
1:140.9.1esr-1
fixed
trixie
1:140.8.0esr-1~deb13u1
fixed
trixie (security)
1:140.9.1esr-1~deb13u1
fixed