{"id":"CVE-2025-4083","details":"A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox \u003c 138, Firefox ESR \u003c 128.10, Firefox ESR \u003c 115.23, Thunderbird \u003c 138, and Thunderbird \u003c 128.10.","modified":"2026-04-16T00:01:26.547186944Z","published":"2025-04-29T14:15:35.003Z","related":["ALSA-2025:4443","ALSA-2025:4458","ALSA-2025:4460","ALSA-2025:4797","ALSA-2025:7428","ALSA-2025:7506","ALSA-2025:7507","SUSE-SU-2025:1436-1","SUSE-SU-2025:1506-1","openSUSE-SU-2025:15042-1","openSUSE-SU-2025:15045-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-28/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-29/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-30/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-31/"},{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2025-32/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1958350"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-4083.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"115.23"}]},{"events":[{"introduced":"0"},{"fixed":"138.0"}]},{"events":[{"introduced":"128.0"},{"fixed":"128.10"}]},{"events":[{"introduced":"0"},{"fixed":"128.10.0"}]},{"events":[{"introduced":"0"},{"fixed":"138.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}