Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5986: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links in Mozilla Thunderbird

0
Medium
VulnerabilityCVE-2025-5986cvecve-2025-5986
Published: Wed Jun 11 2025 (06/11/2025, 12:07:50 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Thunderbird

Description

A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 01:43:31 UTC

Technical Analysis

CVE-2025-5986 is a medium-severity vulnerability in Mozilla Thunderbird email client versions prior to 128.11.1 and 139.0.2. The flaw arises from Thunderbird's handling of mailbox:/// links embedded in crafted HTML emails. When such an email is viewed in HTML mode, it can trigger automatic, unsolicited downloads of PDF files directly to the user's desktop or home directory without any prompt, bypassing the user's auto-save settings. This behavior can be exploited by attackers to fill the victim's disk space with arbitrary data, for example by repeatedly downloading large files or using /dev/urandom on Linux systems to generate garbage data, leading to denial of service conditions. Additionally, the vulnerability can be abused to leak Windows credentials via SMB links embedded in the email, as the email client attempts to load external SMB resources when rendering the HTML content. Although initiating the PDF download requires some user interaction, attackers can use visual obfuscation techniques to conceal the download trigger, increasing the likelihood of exploitation. Simply viewing the email in HTML mode is sufficient to load external content, which can facilitate credential leakage. The vulnerability is tracked under CWE-451 (User Interface (UI) Misrepresentation). The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability due to disk exhaustion. No patches or exploits are currently publicly available, but affected users should consider this a significant risk due to the potential for denial of service and credential exposure.

Potential Impact

For European organizations, this vulnerability poses a risk primarily through denial of service and credential leakage. Disk space exhaustion can disrupt critical email communications and other system operations, potentially impacting business continuity. The credential leakage via SMB links can expose Windows domain credentials, increasing the risk of lateral movement and further compromise within corporate networks. Since Thunderbird is widely used in both private and enterprise environments across Europe, especially in sectors relying on open-source software, the threat is significant. Organizations with large user bases running vulnerable Thunderbird versions may face operational disruptions and increased risk of internal network breaches. The requirement for user interaction to trigger downloads somewhat limits automated exploitation but does not eliminate risk, especially if attackers employ social engineering or visual obfuscation to trick users. The ability to leak credentials without explicit user action when viewing HTML emails further elevates the threat. Overall, the vulnerability could lead to service outages, data exposure, and increased attack surface for follow-on attacks.

Mitigation Recommendations

European organizations should prioritize upgrading Mozilla Thunderbird to versions 128.11.1 or 139.0.2 and later, where this vulnerability is addressed. Until patches are applied, disabling HTML email rendering or configuring Thunderbird to display emails in plain text can mitigate the risk of automatic content loading and credential leakage. Implementing strict email filtering to block or quarantine suspicious emails containing mailbox:/// or SMB links can reduce exposure. User awareness training should emphasize caution with unsolicited emails and discourage clicking on unexpected links or attachments. Network-level controls such as blocking outbound SMB traffic (ports 445 and 139) from client machines can prevent credential leakage via SMB. Monitoring disk usage on endpoints for unusual spikes can help detect exploitation attempts. Additionally, organizations should consider deploying endpoint protection solutions capable of detecting anomalous file downloads or suspicious email behaviors. Regular audits of Thunderbird configurations and user privileges can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mozilla
Date Reserved
2025-06-10T20:07:11.178Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6849756223110031d40fa8ce

Added to database: 6/11/2025, 12:24:02 PM

Last enriched: 11/4/2025, 1:43:31 AM

Last updated: 11/19/2025, 10:37:14 PM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats