Thunderbird parses addresses in a way that can allow...
High severity
Unreviewed
Published
May 14, 2025
to the GitHub Advisory Database
•
Updated May 15, 2025
Description
Published by the National Vulnerability Database
May 14, 2025
Published to the GitHub Advisory Database
May 14, 2025
Last updated
May 15, 2025
Thunderbird parses addresses in a way that can allow sender spoofing in case the server allows an invalid From address to be used. For example, if the From header contains an (invalid) value "Spoofed Name ", Thunderbird treats [email protected] as the actual address. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1.
References