Description
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
Published: 2025-06-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Credential leakage and disk space exhaustion through unsolicited downloads
Action: Immediate Patch
AI Analysis

Impact

A crafted HTML email that includes mailbox:/// links can cause Thunderbird to automatically download PDF files to the user’s desktop or home directory without prompting, even when auto‑saving is disabled. Because the download is triggered when the user opens the email in HTML mode, visual obfuscation can hide the trigger and allow an attacker to fill the victim’s disk with arbitrary data or, on Windows, leak credentials through SMB links. The attacker must still obtain a user’s attention to view the email, but once viewed, the automatic download delivers the storage‑exhaustion or credential‑exfiltration effect. This flaw is identified as a loss of confidentiality through credential exposure and loss of integrity through unauthorized data placement, classified under CWE‑400 and CWE‑451.

Affected Systems

Mozilla Thunderbird is the only publicly listed affected product. All Thunderbird releases prior to 128.11.1 on Linux and prior to 139.0.2 on other platforms are vulnerable. Red Hat Enterprise Linux systems running Thunderbird older than those patches may also be impacted, though the anomaly chiefly relates to the Thunderbird client itself. The CVE references indicate that the issue also appears in Debian LTS announcements, suggesting that base distributions adopting Thunderbird versions before the fixed releases can be at risk.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, with an EPSS of less than 1% implying a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting it has not yet been observed as a widely exploited vector. Attackers can exploit it by phishing with malicious HTML emails that, when opened, cause Thunderbird to silently download large or random data, exhausting disk space, or to resolve SMB links that expose credentials. While user interaction is required to view the email, visual obfuscation can reduce detection, making this a realistic social‑engineering attack in environments with lenient email parsing settings.

Generated by OpenCVE AI on April 20, 2026 at 17:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Thunderbird to the official fixed release (128.11.1 or newer).
  • Configure Thunderbird to block automatic downloads of external content or disable loading of external resources in HTML emails.
  • Verify email authenticity and avoid opening emails with mailbox:/// links from untrusted senders.

Generated by OpenCVE AI on April 20, 2026 at 17:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4239-1 thunderbird security update
Debian DSA Debian DSA DSA-5959-1 thunderbird security update
EUVD EUVD EUVD-2025-18099 A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.
Ubuntu USN Ubuntu USN USN-7663-1 Thunderbird vulnerabilities
History

Mon, 13 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2. A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
Title thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00047}

epss

{'score': 0.0007}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00043}

epss

{'score': 0.00047}


Thu, 03 Jul 2025 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/a:redhat:enterprise_linux:9
cpe:/o:redhat:enterprise_linux:10.0
Vendors & Products Redhat enterprise Linux

Wed, 02 Jul 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla thunderbird
CPEs cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
Vendors & Products Mozilla
Mozilla thunderbird

Wed, 02 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:rhel_aus:8.4
cpe:/a:redhat:rhel_aus:8.6
cpe:/a:redhat:rhel_e4s:8.6
cpe:/a:redhat:rhel_e4s:8.8
cpe:/a:redhat:rhel_e4s:9.2
cpe:/a:redhat:rhel_eus:9.4
cpe:/a:redhat:rhel_tus:8.6
cpe:/a:redhat:rhel_tus:8.8
Vendors & Products Redhat rhel Eus
Redhat rhel Tus

Wed, 02 Jul 2025 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat rhel Aus
Redhat rhel E4s
CPEs cpe:/a:redhat:rhel_aus:8.2
cpe:/a:redhat:rhel_e4s:9.0
Vendors & Products Redhat
Redhat rhel Aus
Redhat rhel E4s

Thu, 12 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Title thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links
Weaknesses CWE-400
References
Metrics threat_severity

None

threat_severity

Important


Wed, 11 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-451
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Jun 2025 12:15:00 +0000

Type Values Removed Values Added
Description A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability affects Thunderbird < 128.11.1 and Thunderbird < 139.0.2.
References

Subscriptions

Mozilla Thunderbird
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T14:28:34.275Z

Reserved: 2025-06-10T20:07:11.178Z

Link: CVE-2025-5986

cve-icon Vulnrichment

Updated: 2025-11-03T20:06:43.375Z

cve-icon NVD

Status : Modified

Published: 2025-06-11T12:15:29.183

Modified: 2026-04-13T15:17:05.767

Link: CVE-2025-5986

cve-icon Redhat

Severity : Important

Publid Date: 2025-06-10T00:00:00Z

Links: CVE-2025-5986 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T17:15:12Z

Weaknesses