CVE-2026-2790
Published: 24 February 2026
Description
Same-origin policy bypass in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely patching of the same-origin policy bypass flaw in the Firefox and Thunderbird Networking: JAR component to prevent exploitation.
Requires vulnerability scanning to identify systems with vulnerable browser versions and prioritized remediation via patching.
Ensures receipt and dissemination of Mozilla security advisories like MFSA 2026-13 for the CVE, enabling prompt flaw remediation.
Security SummaryAI
CVE-2026-2790 is a same-origin policy bypass vulnerability in the Networking: JAR component of Mozilla Firefox and Thunderbird. It affects versions of Firefox prior to 148, Firefox ESR prior to 140.8, Thunderbird prior to 148, and Thunderbird prior to 140.8. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-346 (Origin Validation Error), with additional NVD-CWE-noinfo mapping.
The vulnerability enables exploitation over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to bypass the same-origin policy, potentially leading to high impacts on confidentiality, integrity, and availability, such as unauthorized access to sensitive data, modification of web content, or disruption of browser functionality.
Mozilla security advisories (MFSA 2026-13, 15, 16, and 17) and the associated Bugzilla entry detail the patch, which resolves the issue in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. Security practitioners should prioritize updating affected products to these versions or later to mitigate the vulnerability.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE describes a remotely exploitable client-side SOP bypass in Firefox/Thunderbird (CWE-346) with no auth/UI required and full CIA impact; directly enables T1203 (Exploitation for Client Execution) and T1189 (Drive-by Compromise) as the primary attack techniques.