CVE-2026-2775
Published: 24 February 2026
Description
Mitigation bypass in the DOM: HTML Parser component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Mitigating Controls (NIST 800-53 r5)AI
Mandates timely identification, reporting, and patching of flaws like CVE-2026-2775 in Firefox and Thunderbird HTML parser to prevent exploitation.
Requires vulnerability scanning to identify systems running vulnerable versions of Firefox or Thunderbird affected by CVE-2026-2775.
Ensures dissemination of security advisories such as Mozilla MFSA 2026-13 to prompt patching of CVE-2026-2775.
Security SummaryAI
CVE-2026-2775 is a mitigation bypass vulnerability in the DOM HTML Parser component of Mozilla Firefox and Thunderbird. It affects versions of Firefox prior to 148, Firefox ESR prior to 115.33 and 140.8, and Thunderbird prior to 148 and 140.8. The issue is classified under CWE-288 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact across confidentiality, integrity, and availability.
The vulnerability enables exploitation by any remote, unauthenticated attacker with network access and low attack complexity, requiring no user interaction or privileges. Successful exploitation allows the attacker to bypass security mitigations in the HTML parser, potentially leading to arbitrary code execution, data theft, or system compromise within the affected browser or email client context.
Mozilla's security advisories (MFSA 2026-13 through 2026-16) and the associated Bugzilla entry (bug 2015199) confirm the vulnerability was addressed in the listed fixed releases. Security practitioners should prioritize updating to Firefox 148 or later, Firefox ESR 115.33/140.8 or later, and Thunderbird 148/140.8 or later to mitigate the issue.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE describes remote client-side HTML/DOM parser mitigation bypass in browser/email client leading directly to arbitrary code execution (no UI required); maps to drive-by compromise (T1189) as initial access vector and exploitation for client execution (T1203).