CVE-2022-4055
Publication date 19 November 2022
Last updated 21 August 2025
Ubuntu priority
Cvss 3 Severity Score
When xdg-mail is configured to use thunderbird for mailto URLs, improper parsing of the URL can lead to additional headers being passed to thunderbird that should not be included per RFC 2368. An attacker can use this method to create a mailto URL that looks safe to users, but will actually attach files when clicked.
Status
Package | Ubuntu Release | Status |
---|---|---|
xdg-utils | 25.04 plucky |
Vulnerable
|
24.04 LTS noble |
Vulnerable
|
|
22.04 LTS jammy |
Vulnerable
|
|
20.04 LTS focal |
Vulnerable
|
|
18.04 LTS bionic |
Vulnerable
|
|
16.04 LTS xenial |
Vulnerable
|
|
14.04 LTS trusty | Ignored end of standard support |
Notes
vyomydv
As of 2025-08-21, no patch available. https://gitlab.freedesktop.org/xdg/xdg-utils/-/merge_requests/89 does not fix this CVE, it removes proprietary (non-RFC6068) "mailto?attach=..." parameter. This CVE is around improper quoting allowing command injection.
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N |