CVE-2025-8036

8.1 HIGH

📋 TL;DR

This vulnerability in Thunderbird and Firefox allows attackers to bypass Cross-Origin Resource Sharing (CORS) protections using DNS rebinding attacks. By exploiting cached CORS preflight responses across IP address changes, attackers can make unauthorized cross-origin requests to internal network resources. This affects users of Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.

💻 Affected Systems

Products:
  • Mozilla Firefox
  • Mozilla Firefox ESR
  • Mozilla Thunderbird
Versions: Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 140.1
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The vulnerability requires user interaction (visiting a malicious website or opening a malicious email in Thunderbird).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive internal network resources, steal authentication tokens, perform unauthorized actions on internal applications, and potentially pivot to other systems.

🟠

Likely Case

Attackers could access internal web applications, APIs, or services that rely on CORS protections, potentially stealing data or performing limited unauthorized actions.

🟢

If Mitigated

With proper network segmentation and additional authentication layers, impact is limited to specific exposed services within the same network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires DNS rebinding capabilities and user interaction. The vulnerability is publicly disclosed but no known public exploits exist.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firefox 141, Firefox ESR 140.1, Thunderbird 141, Thunderbird 140.1

Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2025-56/

Restart Required: Yes

Instructions:

1. Open the application (Firefox or Thunderbird). 2. Go to Help > About Firefox/Thunderbird. 3. The application will automatically check for updates and prompt to install. 4. Restart the application after update completes.

🔧 Temporary Workarounds

Disable JavaScript

all

Temporarily disable JavaScript to prevent exploitation, though this breaks most web functionality.

Use DNS filtering

all

Implement DNS filtering to block known malicious domains and prevent DNS rebinding attacks.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate internal resources from user workstations
  • Deploy additional authentication mechanisms for internal applications beyond CORS protections

🔍 How to Verify

Check if Vulnerable:

Check the application version in Help > About Firefox/Thunderbird. If version is below the patched versions listed, the system is vulnerable.

Check Version:

firefox --version (Linux) or check About dialog (Windows/macOS)

Verify Fix Applied:

After updating, verify the version shows Firefox 141+, Firefox ESR 140.1+, Thunderbird 141+, or Thunderbird 140.1+.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cross-origin requests from user workstations to internal resources
  • Multiple failed CORS preflight requests followed by successful requests

Network Indicators:

  • DNS queries to suspicious domains followed by requests to internal IPs
  • Unusual traffic patterns from browsers to internal services

SIEM Query:

source="browser_logs" AND (event="CORS_preflight" OR event="cross_origin_request") AND dest_ip=internal_subnet

🔗 References

📤 Share & Export