CVE-2025-5986: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links in Mozilla Thunderbird
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.
AI Analysis
Technical Summary
CVE-2025-5986 is a medium-severity vulnerability in Mozilla Thunderbird email client versions prior to 128.11.1 and 139.0.2. The flaw arises from Thunderbird's handling of mailbox:/// links embedded in crafted HTML emails. When such an email is viewed in HTML mode, it can trigger automatic, unsolicited downloads of PDF files directly to the user's desktop or home directory without any prompt, bypassing the user's auto-save settings. This behavior can be exploited by attackers to fill the victim's disk space with arbitrary data, for example by repeatedly downloading large files or using /dev/urandom on Linux systems to generate garbage data, leading to denial of service conditions. Additionally, the vulnerability can be abused to leak Windows credentials via SMB links embedded in the email, as the email client attempts to load external SMB resources when rendering the HTML content. Although initiating the PDF download requires some user interaction, attackers can use visual obfuscation techniques to conceal the download trigger, increasing the likelihood of exploitation. Simply viewing the email in HTML mode is sufficient to load external content, which can facilitate credential leakage. The vulnerability is tracked under CWE-451 (User Interface (UI) Misrepresentation). The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability due to disk exhaustion. No patches or exploits are currently publicly available, but affected users should consider this a significant risk due to the potential for denial of service and credential exposure.
Potential Impact
For European organizations, this vulnerability poses a risk primarily through denial of service and credential leakage. Disk space exhaustion can disrupt critical email communications and other system operations, potentially impacting business continuity. The credential leakage via SMB links can expose Windows domain credentials, increasing the risk of lateral movement and further compromise within corporate networks. Since Thunderbird is widely used in both private and enterprise environments across Europe, especially in sectors relying on open-source software, the threat is significant. Organizations with large user bases running vulnerable Thunderbird versions may face operational disruptions and increased risk of internal network breaches. The requirement for user interaction to trigger downloads somewhat limits automated exploitation but does not eliminate risk, especially if attackers employ social engineering or visual obfuscation to trick users. The ability to leak credentials without explicit user action when viewing HTML emails further elevates the threat. Overall, the vulnerability could lead to service outages, data exposure, and increased attack surface for follow-on attacks.
Mitigation Recommendations
European organizations should prioritize upgrading Mozilla Thunderbird to versions 128.11.1 or 139.0.2 and later, where this vulnerability is addressed. Until patches are applied, disabling HTML email rendering or configuring Thunderbird to display emails in plain text can mitigate the risk of automatic content loading and credential leakage. Implementing strict email filtering to block or quarantine suspicious emails containing mailbox:/// or SMB links can reduce exposure. User awareness training should emphasize caution with unsolicited emails and discourage clicking on unexpected links or attachments. Network-level controls such as blocking outbound SMB traffic (ports 445 and 139) from client machines can prevent credential leakage via SMB. Monitoring disk usage on endpoints for unusual spikes can help detect exploitation attempts. Additionally, organizations should consider deploying endpoint protection solutions capable of detecting anomalous file downloads or suspicious email behaviors. Regular audits of Thunderbird configurations and user privileges can further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-5986: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links in Mozilla Thunderbird
Description
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-5986 is a medium-severity vulnerability in Mozilla Thunderbird email client versions prior to 128.11.1 and 139.0.2. The flaw arises from Thunderbird's handling of mailbox:/// links embedded in crafted HTML emails. When such an email is viewed in HTML mode, it can trigger automatic, unsolicited downloads of PDF files directly to the user's desktop or home directory without any prompt, bypassing the user's auto-save settings. This behavior can be exploited by attackers to fill the victim's disk space with arbitrary data, for example by repeatedly downloading large files or using /dev/urandom on Linux systems to generate garbage data, leading to denial of service conditions. Additionally, the vulnerability can be abused to leak Windows credentials via SMB links embedded in the email, as the email client attempts to load external SMB resources when rendering the HTML content. Although initiating the PDF download requires some user interaction, attackers can use visual obfuscation techniques to conceal the download trigger, increasing the likelihood of exploitation. Simply viewing the email in HTML mode is sufficient to load external content, which can facilitate credential leakage. The vulnerability is tracked under CWE-451 (User Interface (UI) Misrepresentation). The CVSS 3.1 base score is 6.5, reflecting network attack vector, low attack complexity, no privileges required, user interaction required, unchanged scope, no confidentiality or integrity impact, but high impact on availability due to disk exhaustion. No patches or exploits are currently publicly available, but affected users should consider this a significant risk due to the potential for denial of service and credential exposure.
Potential Impact
For European organizations, this vulnerability poses a risk primarily through denial of service and credential leakage. Disk space exhaustion can disrupt critical email communications and other system operations, potentially impacting business continuity. The credential leakage via SMB links can expose Windows domain credentials, increasing the risk of lateral movement and further compromise within corporate networks. Since Thunderbird is widely used in both private and enterprise environments across Europe, especially in sectors relying on open-source software, the threat is significant. Organizations with large user bases running vulnerable Thunderbird versions may face operational disruptions and increased risk of internal network breaches. The requirement for user interaction to trigger downloads somewhat limits automated exploitation but does not eliminate risk, especially if attackers employ social engineering or visual obfuscation to trick users. The ability to leak credentials without explicit user action when viewing HTML emails further elevates the threat. Overall, the vulnerability could lead to service outages, data exposure, and increased attack surface for follow-on attacks.
Mitigation Recommendations
European organizations should prioritize upgrading Mozilla Thunderbird to versions 128.11.1 or 139.0.2 and later, where this vulnerability is addressed. Until patches are applied, disabling HTML email rendering or configuring Thunderbird to display emails in plain text can mitigate the risk of automatic content loading and credential leakage. Implementing strict email filtering to block or quarantine suspicious emails containing mailbox:/// or SMB links can reduce exposure. User awareness training should emphasize caution with unsolicited emails and discourage clicking on unexpected links or attachments. Network-level controls such as blocking outbound SMB traffic (ports 445 and 139) from client machines can prevent credential leakage via SMB. Monitoring disk usage on endpoints for unusual spikes can help detect exploitation attempts. Additionally, organizations should consider deploying endpoint protection solutions capable of detecting anomalous file downloads or suspicious email behaviors. Regular audits of Thunderbird configurations and user privileges can further reduce risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mozilla
- Date Reserved
- 2025-06-10T20:07:11.178Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6849756223110031d40fa8ce
Added to database: 6/11/2025, 12:24:02 PM
Last enriched: 11/4/2025, 1:43:31 AM
Last updated: 11/19/2025, 10:37:14 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13420: SQL Injection in itsourcecode Human Resource Management System
MediumCVE-2025-4042
LowCVE-2025-13415: Cross Site Scripting in icret EasyImages
MediumCVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB
LowCVE-2025-63719: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.