A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird < 128.10.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-4087.json"
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "128.10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "138.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "128.10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "138.0"
}
]
}
]