Vulnerability Description
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 115.23 |
| Mozilla | Thunderbird | < 128.10.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1958350Permissions Required
- https://www.mozilla.org/security/advisories/mfsa2025-28/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-29/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-30/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-31/Vendor Advisory
- https://www.mozilla.org/security/advisories/mfsa2025-32/Vendor Advisory
- https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html
FAQ
What is CVE-2025-4083?
CVE-2025-4083 is a vulnerability with a CVSS score of 9.1 (CRITICAL). A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended fr...
How severe is CVE-2025-4083?
CVE-2025-4083 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-4083?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Thunderbird.