High severity8.8NVD Advisory· Published Apr 29, 2025· Updated Apr 13, 2026
CVE-2025-2817
CVE-2025-2817
Description
Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Firefox ESR 115.23, Thunderbird 138, and Thunderbird 128.10.
Affected products
3cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*+ 1 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*range: <115.23.0
- cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*range: <138.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.mozilla.org/security/advisories/mfsa2025-28/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-29/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-30/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-31/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-32/nvdVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdPermissions Required
- lists.debian.org/debian-lts-announce/2025/05/msg00022.htmlnvd
News mentions
0No linked articles in our index yet.