CVE-2025-3875
HIGHMozilla Thunderbird < 128.10.0 - Authentication Bypass by Spoofing
Title source: ruleDescription
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
References (4)
Scores
CVSS v3
7.5
EPSS
0.0037
EPSS Percentile
59.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-290
Status
published
Products (3)
mozilla/thunderbird
< 128.10.0
Mozilla/Thunderbird
128.10.1 - 128.*
Mozilla/Thunderbird
138.0.1
Published
May 14, 2025
Tracked Since
Feb 18, 2026