### [CVE-2021-43528](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=JavaScript%20unexpectedly%20enabled%20for%20the%20composition%20area&color=brightgreen) ### Description Thunderbird unexpectedly enabled JavaScript in the composition area. The JavaScript execution context was limited to this area and did not receive chrome-level privileges, but could be used as a stepping stone to further an attack with other vulnerabilities. This vulnerability affects Thunderbird < 91.4.0. ### POC #### Reference - https://www.mozilla.org/security/advisories/mfsa2021-54/ #### Github No PoCs found on GitHub currently.