First published: Tue May 13 2025(Updated: )
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name spoofed@example.com legitimate@example.com", Thunderbird treats spoofed@example.com as the actual address.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <128.10.1 | |
Thunderbird | <138.0.1 | |
Thunderbird | <128.10.1 | 128.10.1 |
Thunderbird | <138.0.1 | 138.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-3875 is classified as a medium severity vulnerability due to its potential for sender spoofing.
To fix CVE-2025-3875, update Mozilla Thunderbird to version 128.10.1 or 138.0.1 or later.
CVE-2025-3875 affects versions of Mozilla Thunderbird prior to 128.10.1 and prior to 138.0.1.
If affected by CVE-2025-3875, users may be misled by emails that appear to come from spoofed addresses.
There are no documented workarounds for CVE-2025-3875, so users should apply the required updates as soon as possible.