Cyber Posture

CVE-2026-2790

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Same-origin policy bypass in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching of the same-origin policy bypass flaw in the Firefox and Thunderbird Networking: JAR component to prevent exploitation.

preventdetect

Requires vulnerability scanning to identify systems with vulnerable browser versions and prioritized remediation via patching.

detect

Ensures receipt and dissemination of Mozilla security advisories like MFSA 2026-13 for the CVE, enabling prompt flaw remediation.

Security SummaryAI

CVE-2026-2790 is a same-origin policy bypass vulnerability in the Networking: JAR component of Mozilla Firefox and Thunderbird. It affects versions of Firefox prior to 148, Firefox ESR prior to 140.8, Thunderbird prior to 148, and Thunderbird prior to 140.8. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-346 (Origin Validation Error), with additional NVD-CWE-noinfo mapping.

The vulnerability enables exploitation over the network by unauthenticated attackers with low complexity and no user interaction required. Successful exploitation allows attackers to bypass the same-origin policy, potentially leading to high impacts on confidentiality, integrity, and availability, such as unauthorized access to sensitive data, modification of web content, or disruption of browser functionality.

Mozilla security advisories (MFSA 2026-13, 15, 16, and 17) and the associated Bugzilla entry detail the patch, which resolves the issue in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8. Security practitioners should prioritize updating affected products to these versions or later to mitigate the vulnerability.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 140.8.0 · ≤ 148.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

CVE describes a remotely exploitable client-side SOP bypass in Firefox/Thunderbird (CWE-346) with no auth/UI required and full CIA impact; directly enables T1203 (Exploitation for Client Execution) and T1189 (Drive-by Compromise) as the primary attack techniques.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References