CVE-2025-3522 – Thunderbird External Attachment URL Processing Vulnerability

The following table lists the changes that have been made to the
CVE-2025-3522 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Apr. 15, 2025

    Action Type Old Value New Value
    Added Description Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
    Added Reference https://bugzilla.mozilla.org/show_bug.cgi?id=1955372
    Added Reference https://www.mozilla.org/security/advisories/mfsa2025-26/
    Added Reference https://www.mozilla.org/security/advisories/mfsa2025-27/
Share the Post:

Related Posts