Description

Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability was fixed in Thunderbird 128.10.1 and Thunderbird 138.0.1.

INFO

Published Date :

2025-05-14T16:56:42.950Z

Last Modified :

2026-04-13T14:27:50.877Z

Source :

mozilla
AFFECTED PRODUCTS

The following products are affected by CVE-2025-3875 vulnerability.

Vendors Products
Mozilla
  • Thunderbird
Redhat
  • Enterprise Linux
  • Rhel Aus
  • Rhel E4s
  • Rhel Eus
  • Rhel Tus

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact