We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
Reserved 2025-04-29 | Published 2025-04-29 | Updated 2025-05-07 | Assigner mozillaProcess isolation bypass using "javascript:" URI links in cross-origin frames
Nika Layzell
bugzilla.mozilla.org/show_bug.cgi?id=1958350
www.mozilla.org/security/advisories/mfsa2025-28/
www.mozilla.org/security/advisories/mfsa2025-29/
www.mozilla.org/security/advisories/mfsa2025-30/
www.mozilla.org/security/advisories/mfsa2025-31/
www.mozilla.org/security/advisories/mfsa2025-32/
Support options