Impact
A crafted email can present a tracking URL through the X‑Mozilla‑External‑Attachment‑URL header, causing Thunderbird to automatically request the URL when a user opens the attachment. This bypasses the user’s remote‑content blocking setting, resulting in unintended network traffic and potential disclosure of user or device information. The vulnerability does not provide a path to execute code on the system.
Affected Systems
Mozilla Thunderbird is affected in all releases prior to 128.10.1 and 138.0.1. The impact applies to Thunderbird installations on Red Hat Enterprise Linux 8 and 9, including their extended update streams such as RHEL EUS, RHEL E4S, RHEL AUS, and RHEL TUS.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker must send a malicious email and rely on a user opening the attachment; the client then initiates a background request to the URL, achieving remote content exposure.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN