CVE-2025-5986
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-11

Last updated on: 2026-04-13

Assigner: Mozilla Corporation

Description
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-11
Last Modified
2026-04-13
Generated
2026-05-06
AI Q&A
2025-06-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
mozilla thunderbird to 140.0 (inc)
mozilla thunderbird to 140.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-451 The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves crafted HTML emails containing mailbox:/// links that can cause automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without any prompt, even if auto-saving is disabled. Viewing the email in HTML mode is enough to load external content, and visual obfuscation can hide the download trigger. On Windows, it can also leak credentials via SMB links. User interaction is required to download the .pdf file, but the trigger can be concealed. [1, 2]


How can this vulnerability impact me? :

This vulnerability can be exploited to fill the disk with large amounts of unwanted data, potentially exhausting disk space by downloading garbage data such as from /dev/urandom on Linux. It can also lead to leakage of Windows credentials via SMB links when viewing the email in HTML mode. The automatic downloads happen without prompting the user, which can cause unexpected system behavior and security risks. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update Thunderbird to version 139.0.2 or later (for versions below 139.0.2) or to version 128.11.1 or later (for versions below 128.11.1). Avoid viewing emails in HTML mode from untrusted sources, as simply viewing the email in HTML mode can trigger the vulnerability. Additionally, be cautious of emails containing mailbox:/// links and disable automatic loading of external content if possible. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart