We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3909



Description

Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as HTML when opened, allowing the embedded JavaScript to run without requiring a file download. This behavior relies on Thunderbird auto-saving the attachment to /tmp and linking to it via the file:/// protocol, potentially enabling JavaScript execution as part of the HTML. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

Reserved 2025-04-23 | Published 2025-05-14 | Updated 2025-05-16 | Assigner mozilla

Problem types

JavaScript Execution via Spoofed PDF Attachment and file:/// Link

Product status

Any version before 128.10.1
affected

Any version before 138.0.1
affected

Credits

Dario Weißer

References

bugzilla.mozilla.org/show_bug.cgi?id=1958376

www.mozilla.org/security/advisories/mfsa2025-34/

www.mozilla.org/security/advisories/mfsa2025-35/

cve.org (CVE-2025-3909)

nvd.nist.gov (CVE-2025-3909)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3909

Support options

Helpdesk Chat, Email, Knowledgebase