CVE-2025-2817

Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

13 Jun 2025, 18:53

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
First Time Mozilla thunderbird
Mozilla
Mozilla firefox
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1917536 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1917536 - Permissions Required
References () https://www.mozilla.org/security/advisories/mfsa2025-29/ - () https://www.mozilla.org/security/advisories/mfsa2025-29/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-32/ - () https://www.mozilla.org/security/advisories/mfsa2025-32/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-31/ - () https://www.mozilla.org/security/advisories/mfsa2025-31/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-30/ - () https://www.mozilla.org/security/advisories/mfsa2025-30/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-28/ - () https://www.mozilla.org/security/advisories/mfsa2025-28/ - Vendor Advisory

01 May 2025, 15:16

Type Values Removed Values Added
Summary Mozilla Firefox's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10. Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.

29 Apr 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-29 14:15

Updated : 2025-06-13 18:53


NVD link : CVE-2025-2817

Mitre link : CVE-2025-2817


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
CWE

No CWE.