Description
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.
INFO
Published Date :
2025-05-14T16:56:42.950Z
Last Modified :
2026-04-13T14:27:50.877Z
Source :
mozilla
AFFECTED PRODUCTS
The following products are affected by CVE-2025-3875 vulnerability.
| Vendors | Products |
|---|---|
| Mozilla |
|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-3875.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact