CVE-2025-4083

A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*

History

09 May 2025, 19:33

Type Values Removed Values Added
First Time Mozilla thunderbird
Mozilla
Mozilla firefox
CPE cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
References () https://www.mozilla.org/security/advisories/mfsa2025-29/ - () https://www.mozilla.org/security/advisories/mfsa2025-29/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-32/ - () https://www.mozilla.org/security/advisories/mfsa2025-32/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-31/ - () https://www.mozilla.org/security/advisories/mfsa2025-31/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-30/ - () https://www.mozilla.org/security/advisories/mfsa2025-30/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-28/ - () https://www.mozilla.org/security/advisories/mfsa2025-28/ - Vendor Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 - Permissions Required

01 May 2025, 15:16

Type Values Removed Values Added
Summary A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10. A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.

29 Apr 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-29 14:15

Updated : 2025-05-09 19:33


NVD link : CVE-2025-4083

Mitre link : CVE-2025-4083


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
CWE

No CWE.