First published: Tue Mar 04 2025(Updated: )
When requesting an OpenPGP key from a WKD server, an incorrect padding size was used and a network observer could have learned the length of the requested email address.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <136<128.8 | |
Thunderbird | <136 | 136 |
Thunderbird | <128.8 | 128.8 |
Thunderbird | <128.8.0 | |
Thunderbird | >=129.0<136.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-26695 is considered a medium severity vulnerability due to the potential exposure of email address lengths to an attacker.
To fix CVE-2025-26695, upgrade to Thunderbird version 136 or later, or version 128.8 or later.
CVE-2025-26695 affects versions of Thunderbird prior to 136 and prior to 128.8.
The impact of CVE-2025-26695 is that a network observer could potentially learn the length of the requested email address, compromising user privacy.
CVE-2025-26695 was reported as part of security advisories for Mozilla Thunderbird in 2025.