CVE-2026-2761
Published: 24 February 2026
Description
Sandbox escape in the Graphics: WebRender component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of identified flaws through patching, as recommended for CVE-2026-2761 by updating to fixed Firefox and Thunderbird versions.
Mandates receiving and acting on vendor security advisories like Mozilla MFSA2026-13 through -16, enabling prompt updates to mitigate the WebRender sandbox escape.
Requires vulnerability scanning to identify systems running vulnerable Firefox or Thunderbird versions affected by CVE-2026-2761 for prioritized patching.
Security SummaryAI
CVE-2026-2761 is a sandbox escape vulnerability in the Graphics: WebRender component of Mozilla Firefox and Thunderbird. It affects these products in versions prior to the fixed releases: Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. Published on 2026-02-24, the issue carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and is associated with CWEs NVD-CWE-noinfo and CWE-693.
The vulnerability can be exploited by remote attackers with network access, requiring low attack complexity, no privileges, and no user interaction. Exploitation changes scope and enables high-impact consequences across confidentiality, integrity, and availability, allowing attackers to escape the browser sandbox and potentially achieve arbitrary code execution or full system compromise.
Mozilla security advisories MFSA2026-13, MFSA2026-14, MFSA2026-15, and MFSA2026-16 detail the patches applied in the listed fixed versions. Mitigation requires updating affected Firefox and Thunderbird installations to these versions or later, as described in the advisories and the upstream Bugzilla entry at https://bugzilla.mozilla.org/show_bug.cgi?id=2011063.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote sandbox escape in browser rendering engine enables drive-by compromise (T1189), client execution via vuln exploitation (T1203), defense evasion by bypassing sandbox (T1211), and privilege escalation from sandboxed context (T1068).