The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.
References
| Link | Resource |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1939458 | Permissions Required |
| https://www.mozilla.org/security/advisories/mfsa2025-10/ | Vendor Advisory |
| https://www.mozilla.org/security/advisories/mfsa2025-11/ |
Configurations
History
No history.
Information
Published : 2025-02-04 14:15
Updated : 2025-03-10 19:15
NVD link : CVE-2025-1015
Mitre link : CVE-2025-1015
CVE.ORG link : CVE-2025-1015
JSON object : View
Products Affected
mozilla
- thunderbird
CWE
NVD-CWE-noinfo
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
