Cyber Posture

CVE-2026-2796

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 9.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

JIT miscompilation in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation requires patching the JIT miscompilation vulnerability in Firefox and Thunderbird versions prior to 148, directly eliminating the exploitable WebAssembly code execution.

prevent

Memory protection controls like ASLR and DEP prevent unauthorized code execution from the memory corruption caused by the WebAssembly JIT miscompilation.

prevent

Process isolation enforces browser sandboxing to contain arbitrary code execution within the JavaScript engine, limiting damage from the JIT miscompilation exploit.

Security SummaryAI

CVE-2026-2796 is a JIT miscompilation vulnerability in the JavaScript: WebAssembly component of Mozilla Firefox and Thunderbird. This flaw, classified under CWE-843 (incorrect type conversion or cast), allows for improper handling during just-in-time compilation of WebAssembly code, potentially leading to exploitable memory corruption. It affects versions of Firefox and Thunderbird prior to 148 and carries a CVSS v3.1 base score of 9.8, indicating critical severity due to its high impact on confidentiality, integrity, and availability.

A remote attacker can exploit this vulnerability over the network with low attack complexity, requiring no privileges, user interaction, or scope changes. By crafting malicious WebAssembly content deliverable via a website or other network-accessible vector, the attacker could trigger the miscompilation, enabling arbitrary code execution within the browser's sandboxed JavaScript engine. Successful exploitation would grant high-impact control over the affected process, potentially compromising the victim's system if chained with sandbox escapes.

Mozilla addressed this issue in Firefox 148 and Thunderbird 148, as detailed in security advisories MFSA 2026-13 and MFSA 2026-16, along with the upstream bug report at Bugzilla ID 2013165. Security practitioners should prioritize updating affected browsers to these patched versions and monitor for similar JIT-related issues in WebAssembly implementations.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 148.0
mozilla
thunderbird
≤ 148.0

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

CVE enables drive-by compromise (T1189) and client-side exploitation (T1203) via malicious WebAssembly served over the network to achieve RCE in the browser process.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References