Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
History

Sat, 19 Apr 2025 02:00:00 +0000

Type Values Removed Values Added
Title thunderbird: Leak of hashed Window credentials via crafted attachment URL
Weaknesses CWE-1220
References
Metrics threat_severity

None

threat_severity

Important


Tue, 15 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 15 Apr 2025 19:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-601
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}


Tue, 15 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Description Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2025-04-15T19:05:13.896Z

Reserved: 2025-04-11T15:23:30.875Z

Link: CVE-2025-3522

cve-icon Vulnrichment

Updated: 2025-04-15T19:02:33.423Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-15T15:16:09.877

Modified: 2025-04-15T19:16:08.057

Link: CVE-2025-3522

cve-icon Redhat

Severity : Important

Publid Date: 2025-04-15T15:06:13Z

Links: CVE-2025-3522 - Bugzilla