First published: Tue Apr 15 2025(Updated: )
By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <137.0.2<128.9.2 | |
Thunderbird | <137.0.2 | 137.0.2 |
Thunderbird | <128.9.2 | 128.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-2830 is classified as a high-severity vulnerability due to its potential to disclose sensitive information.
To mitigate CVE-2025-2830, update Thunderbird to version 137.0.3 or later.
CVE-2025-2830 affects Mozilla Thunderbird versions 137.0.2 and earlier as well as 128.9.2 and earlier.
CVE-2025-2830 allows attackers to include a directory listing of the /tmp directory by crafting malformed file names in attachments.
Yes, CVE-2025-2830 can be exploited remotely through manipulated multipart messages.