CVE-2025-3875

HIGH

Mozilla Thunderbird < 128.10.0 - Authentication Bypass by Spoofing

Title source: rule
STIX 2.1

Description

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.

Scores

CVSS v3 7.5
EPSS 0.0037
EPSS Percentile 59.2%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-290
Status published
Products (3)
mozilla/thunderbird < 128.10.0
Mozilla/Thunderbird 128.10.1 - 128.*
Mozilla/Thunderbird 138.0.1
Published May 14, 2025
Tracked Since Feb 18, 2026