We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-4083



Description

A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.

Reserved 2025-04-29 | Published 2025-04-29 | Updated 2025-05-07 | Assigner mozilla

Problem types

Process isolation bypass using "javascript:" URI links in cross-origin frames

Product status

Any version before 138
affected

Any version before 128.10
affected

Any version before 115.23
affected

Any version before 138
affected

Any version before 128.10
affected

Credits

Nika Layzell

References

bugzilla.mozilla.org/show_bug.cgi?id=1958350

www.mozilla.org/security/advisories/mfsa2025-28/

www.mozilla.org/security/advisories/mfsa2025-29/

www.mozilla.org/security/advisories/mfsa2025-30/

www.mozilla.org/security/advisories/mfsa2025-31/

www.mozilla.org/security/advisories/mfsa2025-32/

cve.org (CVE-2025-4083)

nvd.nist.gov (CVE-2025-4083)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-4083

Support options

Helpdesk Chat, Email, Knowledgebase