Vulnerability Description
Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 115.23.0 |
| Mozilla | Thunderbird | < 128.10.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1917536Permissions Required
- https://www.mozilla.org/security/advisories/mfsa2025-28/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-29/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-30/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-31/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-32/Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00022.html
FAQ
What is CVE-2025-2817?
CVE-2025-2817 is a vulnerability with a CVSS score of 8.8 (HIGH). Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged ...
How severe is CVE-2025-2817?
CVE-2025-2817 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-2817?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird.