Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-1015— Unsanitized address book fields

EPSS 23.77% · P96
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-1015

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unsanitized address book fields
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability was fixed in Thunderbird 128.7 and Thunderbird 135.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla Thunderbird 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mozilla Thunderbird是美国Mozilla基金会的一套从Mozilla Application Suite独立出来的电子邮件客户端软件。该软件支持IMAP、POP邮件协议以及HTML邮件格式。 Mozilla Thunderbird存在安全漏洞,该漏洞源于Thunderbird地址簿URI字段包含未经清理的链接。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
MozillaThunderbird 128.7 ~ 128.* -

II. Public POCs for CVE-2025-1015

#POC DescriptionSource LinkShenlong Link
1an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScripthttps://github.com/r3m0t3nu11/CVE-2025-1015POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-1015

登录查看更多情报信息。

Same Patch Batch · Mozilla · 2025-02-04 · 13 CVEs total

CVE-2025-1020Memory safety bugs fixed in Firefox 135 and Thunderbird 135
CVE-2025-1016Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR
CVE-2025-1017Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbi
CVE-2025-0510Address of e-mail sender can be spoofed by malicious email
CVE-2025-1014Certificate length was not properly checked
CVE-2025-1019Fullscreen notification not properly displayed
CVE-2025-1013Potential opening of private browsing tabs in normal browsing windows
CVE-2025-1012Use-after-free during concurrent delazification
CVE-2025-1018Fullscreen notification is not displayed when fullscreen is re-requested
CVE-2025-1011A bug in WebAssembly code generation could result in a crash
CVE-2025-1009Use-after-free in XSLT
CVE-2025-1010Use-after-free in Custom Highlight

IV. Related Vulnerabilities

V. Comments for CVE-2025-1015

No comments yet


Leave a comment