Cyber Posture

CVE-2026-2763

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 7.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires identification, reporting, and timely correction of system flaws, directly addressing the need to patch this use-after-free vulnerability in the JavaScript engine.

prevent

Implements memory protection controls specifically designed to minimize the impact of use-after-free vulnerabilities like CVE-2026-2763.

preventdetect

Conducts vulnerability scanning to identify and remediate flaws such as this critical JavaScript engine vulnerability in deployed Firefox and Thunderbird instances.

Security SummaryAI

CVE-2026-2763 is a use-after-free vulnerability (CWE-416) in the JavaScript Engine component of Mozilla Firefox and Thunderbird products. It affects versions prior to the fixed releases, including Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. The vulnerability was publicly disclosed on 2026-02-24 and carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.

An unauthenticated attacker can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation could allow arbitrary code execution, data corruption, or denial of service within the affected browser or email client context, potentially compromising the victim's system if chained with other flaws.

Mozilla's security advisories (MFSA 2026-13 through 2026-16) and the associated Bugzilla entry detail the patch deployments in the specified versions, recommending immediate upgrades to mitigate the issue. No workarounds are mentioned in the provided references.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.33.0 · ≤ 148.0 · 128.0 — 140.8.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Use-after-free in JS engine enables remote arbitrary code execution in client software (browser/email) with no user interaction required, directly mapping to T1203 Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References