CVE-2025-2830
Description
By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability was fixed in Thunderbird 137.0.2 and Thunderbird 128.9.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A malformed attachment filename in Thunderbird can leak the /tmp directory listing when the email is forwarded or edited as new.
Vulnerability
Overview
CVE-2025-2830 is an information disclosure vulnerability in Thunderbird affecting both Linux and Windows platforms. By crafting a malformed file name for an attachment in a multipart message, an attacker can trigger Thunderbird to include a directory listing of /tmp when the user forwards or edits the message as new [1][2]. The root cause is improper handling of malformed attachment filenames, which leads to the unexpected inclusion of file system contents.
Attack
Vector
The attacker sends a specially crafted email with an attachment whose filename is intentionally malformed. No user interaction beyond forwarding or editing the received message is required to trigger the bug. The vulnerability does not require the victim to click on any link; simply forwarding or replying causes the directory listing to be embedded in the new message [1][2]. The impact is rated high (CVSSv3 6.3) because it directly exposes sensitive temporary file information.
Impact
An attacker who exploits this vulnerability can see the names of files and directories in /tmp (or the equivalent temporary directory on Windows). This could reveal temporary files created by other applications, session data, or any information stored in the user's temporary directory. The disclosure is limited to the directory listing and does not include file contents, but the listing alone may leak sensitive metadata such as file names and timestamps [1][2][3].
Mitigation
This vulnerability is fixed in Thunderbird versions 137.0.2 and 128.9.2 [1][2]. Users should update to the latest available version as soon as possible. No workarounds other than updating have been documented.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.mozilla.org/security/advisories/mfsa2025-26/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-27/nvdVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdPermissions Required
News mentions
0No linked articles in our index yet.