Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3909: JavaScript Execution via Spoofed PDF Attachment and file:/// Link in Mozilla Thunderbird

0
High
VulnerabilityCVE-2025-3909cvecve-2025-3909
Published: Wed May 14 2025 (05/14/2025, 16:56:43 UTC)
Source: CVE
Vendor/Project: Mozilla
Product: Thunderbird

Description

Thunderbird's handling of the X-Mozilla-External-Attachment-URL header can be exploited to execute JavaScript in the file:/// context. By crafting a nested email attachment (message/rfc822) and setting its content type to application/pdf, Thunderbird may incorrectly render it as HTML when opened, allowing the embedded JavaScript to run without requiring a file download. This behavior relies on Thunderbird auto-saving the attachment to /tmp and linking to it via the file:/// protocol, potentially enabling JavaScript execution as part of the HTML. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:30:23 UTC

Technical Analysis

CVE-2025-3909 is a vulnerability in Mozilla Thunderbird's handling of the X-Mozilla-External-Attachment-URL header that can lead to JavaScript execution in the file:/// context. The issue stems from Thunderbird’s processing of nested email attachments of type message/rfc822, where an attacker can craft an attachment with a spoofed content type of application/pdf. When the user opens this nested attachment, Thunderbird may incorrectly render it as HTML rather than a PDF, allowing any embedded JavaScript code to execute. This behavior is facilitated by Thunderbird’s auto-saving of attachments to the /tmp directory and linking to them via file:/// URLs, which do not impose the same origin restrictions as remote content. The vulnerability affects Thunderbird versions prior to 128.10.1 and 138.0.1. Exploitation requires user interaction—opening the malicious nested attachment—but does not require authentication or elevated privileges. The CVSS v3.1 base score is 8.1, reflecting high severity due to network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality and integrity. This vulnerability is categorized under CWE-356 (Incorrect Handling of URL Scheme). No patches were linked at the time of disclosure, and no known exploits are reported in the wild. The flaw could allow attackers to execute arbitrary JavaScript code in the local file context, potentially leading to data theft, session hijacking, or further system compromise.

Potential Impact

The vulnerability poses a significant risk to organizations globally that use Mozilla Thunderbird as their email client. Successful exploitation can lead to execution of arbitrary JavaScript code in the local file context, which may bypass typical web security controls such as same-origin policy. This can result in unauthorized access to sensitive information, credential theft, or manipulation of email content and attachments. Since the attack vector is via email, it can be leveraged in targeted phishing campaigns or mass email attacks. The requirement for user interaction (opening a crafted nested attachment) limits automated exploitation but does not eliminate risk, especially in environments with less security awareness. The impact on confidentiality and integrity is high, while availability is not directly affected. Organizations handling sensitive communications, intellectual property, or regulated data are at increased risk. Additionally, the vulnerability could be chained with other exploits to escalate privileges or move laterally within networks.

Mitigation Recommendations

Organizations should immediately plan to upgrade affected Thunderbird versions to 128.10.1 or 138.0.1 once patches are released. Until then, specific mitigations include: 1) Educate users to be cautious with nested email attachments, especially those purporting to be PDFs but received unexpectedly or from unknown senders. 2) Disable automatic saving of attachments to temporary directories if configurable, or restrict permissions on /tmp to limit script execution. 3) Employ email gateway filters to detect and quarantine suspicious nested message/rfc822 attachments with spoofed content types. 4) Use endpoint security solutions capable of detecting anomalous script execution originating from local file URLs. 5) Monitor email client logs and network traffic for unusual file:/// URL access patterns. 6) Consider disabling JavaScript execution in Thunderbird if feasible or using hardened configurations that restrict file:/// script execution. 7) Implement multi-factor authentication and network segmentation to reduce impact if compromise occurs. These steps go beyond generic advice by focusing on attachment handling, user training, and environment hardening specific to this vulnerability’s exploitation vector.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-04-23T17:44:42.650Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0b3

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 2/26/2026, 9:30:23 PM

Last updated: 3/24/2026, 9:19:00 PM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses