CVE-2025-1015

The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*

History

10 Mar 2025, 19:15

Type Values Removed Values Added
References
  • () https://www.mozilla.org/security/advisories/mfsa2025-11/ -
Summary (en) The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7. (en) The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.

06 Feb 2025, 22:15

Type Values Removed Values Added
CWE CWE-79

06 Feb 2025, 19:36

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Mozilla
Mozilla thunderbird
Summary
  • (es) Los campos URI de la libreta de direcciones de Thunderbird contenían enlaces no desinfectada. Un atacante podría utilizar esto para crear y exportar una libreta de direcciones que contuviera un payload malicioso en un campo. Por ejemplo, en el campo “Otros” de la sección de mensajería instantánea. Si otro usuario importaba la libreta de direcciones, al hacer clic en el enlace se podía abrir una página web dentro de Thunderbird y esa página podía ejecutar JavaScript (sin privilegios). Esta vulnerabilidad afecta a Thunderbird &lt; 128.7.
CPE cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1939458 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1939458 - Permissions Required
References () https://www.mozilla.org/security/advisories/mfsa2025-10/ - () https://www.mozilla.org/security/advisories/mfsa2025-10/ - Vendor Advisory

04 Feb 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-04 14:15

Updated : 2025-03-10 19:15


NVD link : CVE-2025-1015

Mitre link : CVE-2025-1015

CVE.ORG link : CVE-2025-1015


JSON object : View

Products Affected

mozilla

  • thunderbird
CWE
NVD-CWE-noinfo CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')