Mozilla Foundation Security Advisory 2025-84
Security Vulnerabilities fixed in Thunderbird 144
- Announced
- October 14, 2025
- Impact
- high
- Products
- Thunderbird
- Fixed in
-
- Thunderbird 144
In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts.
#CVE-2025-11708: Use-after-free in MediaTrackGraphImpl::GetInstance()
- Reporter
- Irvan Kurniawan
- Impact
- high
Description
Use-after-free in MediaTrackGraphImpl::GetInstance()
References
#CVE-2025-11709: Out of bounds read/write in a privileged process triggered by WebGL textures
- Reporter
- Oskar L
- Impact
- high
Description
A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures.
References
#CVE-2025-11710: Cross-process information leaked due to malicious IPC messages
- Reporter
- Oskar L
- Impact
- high
Description
A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process.
References
#CVE-2025-11711: Some non-writable Object properties could be modified
- Reporter
- EntryHi
- Impact
- high
Description
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable.
References
#CVE-2025-11716: Sandboxed iframes allowed links to open in external apps (Android only)
- Reporter
- Axel Chong (@Haxatron)
- Impact
- moderate
Description
Links in a sandboxed iframe could open an external app on Android without the required "allow-" permission.
References
#CVE-2025-11712: An OBJECT tag type attribute overrode browser behavior on web resources without a content-type
- Reporter
- Masato Kinugawa
- Impact
- moderate
Description
A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header.
References
#CVE-2025-11713: Potential user-assisted code execution in “Copy as cURL” command
- Reporter
- Hafiizh & kang ali
- Impact
- moderate
Description
Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems.
References
#CVE-2025-11719: Use-after-free caused by the native messaging web extension API on Windows
- Reporter
- Filip Štamcar
- Impact
- moderate
Description
Starting in Firefox 143, the use of the native messaging API by web extensions on Windows could lead to crashes caused by use-after-free memory corruption.
References
#CVE-2025-11714: Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
- Reporter
- The Mozilla Fuzzing Team
- Impact
- high
Description
Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-11715: Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
- Reporter
- The Mozilla Fuzzing Team
- Impact
- high
Description
Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-11721: Memory safety bug fixed in Firefox 144 and Thunderbird 144
- Reporter
- None
- Impact
- high
Description
Memory safety bug present in Firefox 143 and Thunderbird 143. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code.