Cyber Posture

CVE-2025-1015

Medium

Published: 04 February 2025

Published
04 February 2025
Modified
13 April 2026
KEV Added
Patch
CVSS Score 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
EPSS Score 0.2377 96.0th percentile
Risk Priority 25 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1015 is a medium-severity Cross-site Scripting (CWE-79) vulnerability in Mozilla Thunderbird. Its CVSS base score is 5.4 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked in the top 4.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-18 (Mobile Code) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Malicious File (T1204.002) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching of the Thunderbird flaw lacking URI sanitization in Address Book fields, as fixed in versions 128.7 and 135.

prevent

Mandates validation of URI inputs in Address Book fields during import to block malicious links and payloads.

prevent

Restricts execution of unprivileged JavaScript mobile code from web pages opened via malicious Address Book links.

MITRE ATT&CK Enterprise TechniquesAI

T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

XSS in address book enables JS execution after import/click of malicious file (T1204.002, T1059.007).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging…

more

section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability was fixed in Thunderbird 128.7 and Thunderbird 135.

Deeper analysisAI

CVE-2025-1015 is a vulnerability in Mozilla Thunderbird's Address Book URI fields, which lacked proper sanitization of links. An attacker could craft an address book containing a malicious payload embedded in a field, such as the “Other” field in the Instant Messaging section, and export it for distribution. Affected versions of Thunderbird prior to 128.7 and 135 are vulnerable, with the issue tracked under CWE-79 (cross-site scripting) and assigned a CVSS v3.1 base score of 5.4 (AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).

Exploitation requires a targeted attack where the victim imports the malicious address book file and subsequently clicks on the embedded link. Any remote attacker can create such a file without privileges, but success depends on user interaction to import and activate the payload. Upon clicking, the link opens a web page within Thunderbird's context, allowing execution of unprivileged JavaScript, potentially leading to low-impact confidentiality and integrity violations like phishing or data exfiltration in the browser's isolated environment.

Mozilla addressed this in Thunderbird 128.7 and 135, as detailed in security advisories MFSA 2025-10 and MFSA 2025-11, available at the referenced Mozilla Security pages, along with Bugzilla entry 1939458. Security practitioners should ensure users update to patched versions and advise caution with importing address books from untrusted sources.

Details

CWE(s)

Affected Products

mozilla
thunderbird
128.0.1 — 128.7.0

CVEs Like This One

CVE-2026-3889Same product: Mozilla Thunderbird
CVE-2026-4371Same product: Mozilla Thunderbird
CVE-2026-6779Same product: Mozilla Thunderbird
CVE-2026-2447Same product: Mozilla Thunderbird
CVE-2025-1009Same product: Mozilla Thunderbird
CVE-2026-2803Same product: Mozilla Thunderbird
CVE-2025-9185Same product: Mozilla Thunderbird
CVE-2026-2783Same product: Mozilla Thunderbird
CVE-2026-2784Same product: Mozilla Thunderbird
CVE-2026-2788Same product: Mozilla Thunderbird

References