CVE-2026-2763
Published: 24 February 2026
Description
Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Mitigating Controls (NIST 800-53 r5)AI
Requires identification, reporting, and timely correction of system flaws, directly addressing the need to patch this use-after-free vulnerability in the JavaScript engine.
Implements memory protection controls specifically designed to minimize the impact of use-after-free vulnerabilities like CVE-2026-2763.
Conducts vulnerability scanning to identify and remediate flaws such as this critical JavaScript engine vulnerability in deployed Firefox and Thunderbird instances.
Security SummaryAI
CVE-2026-2763 is a use-after-free vulnerability (CWE-416) in the JavaScript Engine component of Mozilla Firefox and Thunderbird products. It affects versions prior to the fixed releases, including Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. The vulnerability was publicly disclosed on 2026-02-24 and carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.
An unauthenticated attacker can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation could allow arbitrary code execution, data corruption, or denial of service within the affected browser or email client context, potentially compromising the victim's system if chained with other flaws.
Mozilla's security advisories (MFSA 2026-13 through 2026-16) and the associated Bugzilla entry detail the patch deployments in the specified versions, recommending immediate upgrades to mitigate the issue. No workarounds are mentioned in the provided references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in JS engine enables remote arbitrary code execution in client software (browser/email) with no user interaction required, directly mapping to T1203 Exploitation for Client Execution.