Cyber Posture

CVE-2026-2784

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, reporting, and correction of flaws like CVE-2026-2784 via vendor patches to prevent DOM security mitigation bypass exploitation.

prevent

Ensures receipt and implementation of security advisories such as Mozilla MFSA 2026-13, enabling prompt upgrades to mitigate this Firefox DOM vulnerability.

detect

Vulnerability scanning detects systems running vulnerable Firefox versions prior to 148 or ESR 140.8 affected by CVE-2026-2784.

Security SummaryAI

CVE-2026-2784 is a mitigation bypass vulnerability in the DOM Security component affecting Mozilla Firefox prior to version 148, Firefox ESR prior to 140.8, Thunderbird prior to 148, and Thunderbird prior to 140.8. Assigned CWE-288 and published on 2026-02-24, it carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.

The vulnerability enables exploitation over a network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to bypass security mitigations in the DOM, potentially leading to arbitrary code execution or other severe compromises as reflected in the high impact metrics (C:H/I:H/A:H) and unchanged scope (S:U).

Mozilla security advisories (MFSA 2026-13, 15, 16, 17) and the associated Bugzilla entry (2012984) confirm the issue was addressed in the listed fixed versions, recommending immediate upgrades to mitigate the bypass. No additional workarounds are detailed in the provided references.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 140.8.0 · ≤ 148.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The CVE describes a remote mitigation bypass in a client application (Firefox/Thunderbird) enabling unauthenticated arbitrary code execution with no user interaction, which directly maps to exploitation of client software for code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References