A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
                
            References
                    | Link | Resource | 
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 | Permissions Required | 
| https://www.mozilla.org/security/advisories/mfsa2025-28/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-29/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-30/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-31/ | Vendor Advisory | 
| https://www.mozilla.org/security/advisories/mfsa2025-32/ | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    09 May 2025, 19:33
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 - Permissions Required | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-28/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-29/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-30/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-31/ - Vendor Advisory | |
| References | () https://www.mozilla.org/security/advisories/mfsa2025-32/ - Vendor Advisory | |
| First Time | Mozilla firefox Mozilla thunderbird Mozilla | |
| CPE | cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:* cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:* cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:* | 
01 May 2025, 15:16
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10. | 
30 Apr 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-653 | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 9.1 | 
| Summary | 
 | 
29 Apr 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-04-29 14:15
Updated : 2025-05-09 19:33
NVD link : CVE-2025-4083
Mitre link : CVE-2025-4083
CVE.ORG link : CVE-2025-4083
JSON object : View
Products Affected
                mozilla
- firefox
- thunderbird
CWE
                
                    
                        
                        CWE-653
                        
            Improper Isolation or Compartmentalization
