First published: Tue Apr 15 2025(Updated: )
Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <137.0.2 | |
Thunderbird | <128.9.2 | |
Thunderbird | <137.0.2 | 137.0.2 |
Thunderbird | <128.9.2 | 128.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-3522 is considered a moderate severity vulnerability due to its potential for exploitation through unvalidated URL handling.
To fix CVE-2025-3522, update Thunderbird to the latest version beyond 137.0.2.
CVE-2025-3522 affects Thunderbird versions up to and including 137.0.2 and 128.9.2.
The vulnerability in CVE-2025-3522 is caused by Thunderbird processing the X-Mozilla-External-Attachment-URL header without proper URL validation.
Yes, user interaction is required to exploit CVE-2025-3522 as the vulnerability is triggered when the user opens an affected email.