HomeMozillaCVE-2026-0818

CVE-2026-0818

MEDIUM
4.3CVSS
Published: 2026-01-28
Updated: 2026-02-04
AI Analysis

Description

When a user explicitly requested Thunderbird to decrypt an inline OpenPGP message that was embedded in a text section of an email that was formatted and styled with HTML and CSS, then the decrypted contents were rendered in a context in which the CSS styles from the outer messages were active. If the user had additionally allowed loading of the remote content referenced by the outer email message, and the email was crafted by the sender using a combination of CSS rules and fonts and animations, then it was possible to extract the secret contents of the email. This vulnerability affects Thunderbird < 147.0.1 and Thunderbird < 140.7.1.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-116CWE-200CWE-352

Metadata

Primary Vendor
MOZILLA
Published
1/28/2026
Last Modified
2/4/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

mozilla : thunderbirdmozilla : thunderbird

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-0818 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com