Cyber Posture

CVE-2026-2775

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Mitigation bypass in the DOM: HTML Parser component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely identification, reporting, and patching of flaws like CVE-2026-2775 in Firefox and Thunderbird HTML parser to prevent exploitation.

detect

Requires vulnerability scanning to identify systems running vulnerable versions of Firefox or Thunderbird affected by CVE-2026-2775.

prevent

Ensures dissemination of security advisories such as Mozilla MFSA 2026-13 to prompt patching of CVE-2026-2775.

Security SummaryAI

CVE-2026-2775 is a mitigation bypass vulnerability in the DOM HTML Parser component of Mozilla Firefox and Thunderbird. It affects versions of Firefox prior to 148, Firefox ESR prior to 115.33 and 140.8, and Thunderbird prior to 148 and 140.8. The issue is classified under CWE-288 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact across confidentiality, integrity, and availability.

The vulnerability enables exploitation by any remote, unauthenticated attacker with network access and low attack complexity, requiring no user interaction or privileges. Successful exploitation allows the attacker to bypass security mitigations in the HTML parser, potentially leading to arbitrary code execution, data theft, or system compromise within the affected browser or email client context.

Mozilla's security advisories (MFSA 2026-13 through 2026-16) and the associated Bugzilla entry (bug 2015199) confirm the vulnerability was addressed in the listed fixed releases. Security practitioners should prioritize updating to Firefox 148 or later, Firefox ESR 115.33/140.8 or later, and Thunderbird 148/140.8 or later to mitigate the issue.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.33.0 · ≤ 148.0 · 128.0 — 140.8.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

CVE describes remote client-side HTML/DOM parser mitigation bypass in browser/email client leading directly to arbitrary code execution (no UI required); maps to drive-by compromise (T1189) as initial access vector and exploitation for client execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References