CVE-2025-26696

7.0 HIGH

📋 TL;DR

This vulnerability in Thunderbird email client incorrectly displays signed OpenPGP messages as encrypted messages when crafted MIME emails claim to contain encryption. This affects Thunderbird users on vulnerable versions, potentially leading to users mistakenly trusting message confidentiality that doesn't exist.

💻 Affected Systems

Products:
  • Mozilla Thunderbird
Versions: Thunderbird < 136 and Thunderbird < 128.8
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Thunderbird installations with OpenPGP support enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could trick users into believing sensitive information is encrypted when it's actually readable by anyone intercepting the message, leading to data exposure.

🟠

Likely Case

Users might mistakenly share sensitive information thinking it's encrypted, potentially exposing confidential data in transit.

🟢

If Mitigated

With proper email security controls and user awareness, the impact is limited to potential confusion about message security status.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires crafting specific MIME email messages and convincing users to open them

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Thunderbird 136 or Thunderbird 128.8

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-17/

Restart Required: No

Instructions:

1. Open Thunderbird. 2. Go to Help > About Thunderbird. 3. Check version. 4. If vulnerable, update via built-in updater or download from mozilla.org/thunderbird

🔧 Temporary Workarounds

Disable OpenPGP support

all

Temporarily disable OpenPGP message processing in Thunderbird

Use webmail interface

all

Access email through web interface instead of Thunderbird client

🧯 If You Can't Patch

  • Educate users to verify encryption status manually before sending sensitive information
  • Implement email gateway filtering for suspicious MIME structures

🔍 How to Verify

Check if Vulnerable:

Check Thunderbird version in Help > About Thunderbird

Check Version:

thunderbird --version

Verify Fix Applied:

Verify version is Thunderbird 136 or Thunderbird 128.8 or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual MIME structure in email logs
  • Multiple failed OpenPGP decryption attempts

Network Indicators:

  • Emails with crafted MIME parts claiming OpenPGP encryption

SIEM Query:

source="thunderbird" AND (event="openpgp_error" OR event="mime_parsing_error")

🔗 References

📤 Share & Export