{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T14:30:52.286","vulnerabilities":[{"cve":{"id":"CVE-2025-4087","sourceIdentifier":"security@mozilla.org","published":"2025-04-29T14:15:35.357","lastModified":"2026-04-13T15:17:00.210","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability was fixed in Firefox 138, Firefox ESR 128.10, Thunderbird 138, and Thunderbird 128.10."},{"lang":"es","value":"Se identificó una vulnerabilidad en Firefox donde el análisis de XPath podía generar un comportamiento indefinido debido a la omisión de comprobaciones nulas durante el acceso a atributos. Esto podría provocar accesos de lectura fuera de los límites y, potencialmente, corrupción de memoria. Esta vulnerabilidad afecta a Firefox &lt; 138, Firefox ESR &lt; 128.10, Thunderbird &lt; 138 y Thunderbird ESR &lt; 128.10."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*","versionEndExcluding":"128.10","matchCriteriaId":"3378E5EE-9ABF-444B-AA88-9EAF8D8058DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*","versionEndExcluding":"138.0","matchCriteriaId":"EB8A8C7B-B65D-4DF5-BDB5-0C3C4E2DB72C"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*","versionEndExcluding":"128.10.0","matchCriteriaId":"DC19822B-CC07-4C6F-BAAD-C7A9C4E73FA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*","versionEndExcluding":"138.0","matchCriteriaId":"D1E8CCF1-4E91-44CC-A652-B23D1337A485"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1952465","source":"security@mozilla.org","tags":["Permissions Required"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-28/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-29/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-31/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2025-32/","source":"security@mozilla.org","tags":["Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00024.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}