CVE-2025-3909 — Product UI does not Warn User of Unsafe Actions in Mozilla Thunderbird
Severity
8.1HIGHNVD
EPSS
0.4%
top 37.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 14
Latest updateJul 22
Description
Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as HTML when opened, allowing the embedded JavaScript to run without requiring a file download. This behavior relies on Thunderbird auto-saving the attachment to /tmp and linking to it via the file:/// protocol, potentially…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2
Affected Packages2 packages
🔴Vulnerability Details
3GHSA▶
GHSA-h6cg-6m9j-xj9g: Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context↗2025-05-14
OSV▶
CVE-2025-3909: Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context↗2025-05-14
📋Vendor Advisories
5Debian▶
CVE-2025-3909: thunderbird - Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be ex...↗2025