Mozilla Foundation Security Advisory 2025-23

Security Vulnerabilities fixed in Thunderbird 137

Announced
April 1, 2025
Impact
high
Products
Thunderbird
Fixed in
  • Thunderbird 137

#CVE-2025-3028: Use-after-free triggered by XSLTProcessor

Reporter
Ivan Fratric of Google Project Zero
Impact
high
Description

JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free.

References

#CVE-2025-3031: JIT optimization bug with different stack slot sizes

Reporter
anbu
Impact
moderate
Description

An attacker could read 32 bits of values spilled onto the stack in a JIT compiled function.

References

#CVE-2025-3032: Leaking file descriptors from the fork server

Reporter
Thinker Li
Impact
moderate
Description

Leaking of file descriptors from the fork server to web content processes could allow for privilege escalation attacks.

References

#CVE-2025-3029: URL bar spoofing via non-BMP Unicode characters

Reporter
Renwa Hiwa
Impact
moderate
Description

A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack.

References

#CVE-2025-3033: Opening local .url files could lead to another file being opened

Reporter
Ameen Basha M K
Impact
low
Description

After selecting a malicious Windows .url shortcut from the local filesystem, an unexpected file could be uploaded.
This bug only affects Thunderbird on Windows. Other operating systems are unaffected.

References

#CVE-2025-3030: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9

Reporter
Sylvestre Ledru, Paul Bone and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2025-3034: Memory safety bugs fixed in Firefox 137 and Thunderbird 137

Reporter
Andrew McCreight and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 136 and Thunderbird 136. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References