A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.23"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "138.0"
}
]
},
{
"events": [
{
"introduced": "128.0"
},
{
"fixed": "128.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "128.10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "138.0"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-4083.json"