CVE-2025-4083
CRITICALDescription
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| mozilla | firefox |
| mozilla | firefox |
| mozilla | firefox |
| mozilla | thunderbird |
| mozilla | thunderbird |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2025-4083? +
How severe is CVE-2025-4083? +
What products are affected by CVE-2025-4083? +
How do I check if I'm vulnerable to CVE-2025-4083? +
Related Vulnerabilities
In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write …
When using the Grafana Databricks Datasource Plugin, if Oauth passthrough is enabled on the datasource, and multiple users are using …
Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by …
When using the Grafana Snowflake Datasource Plugin, if Oauth passthrough is enabled on the datasource, and multiple users are using …
A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network …
lunasvg v2.3.9 was discovered to contain a segmentation violation via the component composition_solid_source_over.