A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
The product does not properly compartmentalize or isolate functionality, processes, or resources that require different privilege levels, rights, or permissions.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1958350 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2025-28/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-29/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-30/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-31/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-32/ | vendor advisory |