CVE-2026-2784
Published: 24 February 2026
Description
Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely identification, reporting, and correction of flaws like CVE-2026-2784 via vendor patches to prevent DOM security mitigation bypass exploitation.
Ensures receipt and implementation of security advisories such as Mozilla MFSA 2026-13, enabling prompt upgrades to mitigate this Firefox DOM vulnerability.
Vulnerability scanning detects systems running vulnerable Firefox versions prior to 148 or ESR 140.8 affected by CVE-2026-2784.
Security SummaryAI
CVE-2026-2784 is a mitigation bypass vulnerability in the DOM Security component affecting Mozilla Firefox prior to version 148, Firefox ESR prior to 140.8, Thunderbird prior to 148, and Thunderbird prior to 140.8. Assigned CWE-288 and published on 2026-02-24, it carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its potential for high impact on confidentiality, integrity, and availability.
The vulnerability enables exploitation over a network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to bypass security mitigations in the DOM, potentially leading to arbitrary code execution or other severe compromises as reflected in the high impact metrics (C:H/I:H/A:H) and unchanged scope (S:U).
Mozilla security advisories (MFSA 2026-13, 15, 16, 17) and the associated Bugzilla entry (2012984) confirm the issue was addressed in the listed fixed versions, recommending immediate upgrades to mitigate the bypass. No additional workarounds are detailed in the provided references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a remote mitigation bypass in a client application (Firefox/Thunderbird) enabling unauthenticated arbitrary code execution with no user interaction, which directly maps to exploitation of client software for code execution.