The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Mar 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7. | The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135. |
References |
|
Thu, 13 Feb 2025 01:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.2 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_aus:8.6 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_e4s:8.6 cpe:/a:redhat:rhel_e4s:9.0 cpe:/a:redhat:rhel_eus:8.8 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_eus:9.4 cpe:/a:redhat:rhel_tus:8.4 cpe:/a:redhat:rhel_tus:8.6 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
Fri, 07 Feb 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | thunderbird: Unsanitized address book fields | |
Weaknesses | CWE-601 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 06 Feb 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-79 | |
Metrics |
ssvc
|
Thu, 06 Feb 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Mozilla
Mozilla thunderbird |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:* | |
Vendors & Products |
Mozilla
Mozilla thunderbird |
|
Metrics |
cvssV3_1
|
Tue, 04 Feb 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7. | |
References |
|

Status: PUBLISHED
Assigner: mozilla
Published: 2025-02-04T13:58:56.867Z
Updated: 2025-03-10T18:41:26.138Z
Reserved: 2025-02-04T07:26:39.563Z
Link: CVE-2025-1015

Updated: 2025-02-06T21:14:52.924Z

Status : Modified
Published: 2025-02-04T14:15:32.363
Modified: 2025-03-10T19:15:39.590
Link: CVE-2025-1015
