CVE-2026-4684
Published: 24 March 2026
Description
Race condition, use-after-free in the Graphics: WebRender component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Mitigating Controls (NIST 800-53 r5)AI
Timely identification, reporting, and patching of the race condition and use-after-free flaw in Firefox WebRender directly remediates CVE-2026-4684.
Vulnerability scanning identifies systems running vulnerable Firefox or Thunderbird versions affected by CVE-2026-4684.
Memory protections such as ASLR and DEP mitigate use-after-free exploitation in the WebRender component even on unpatched systems.
Security SummaryAI
CVE-2026-4684 is a race condition vulnerability that can lead to a use-after-free error in the Graphics: WebRender component of Mozilla Firefox and Thunderbird. It affects versions of Firefox prior to 149, Firefox ESR prior to 115.34 and 140.9, and Thunderbird prior to 149 and 140.9. The issue is classified under CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization) and CWE-416 (Use After Free), with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
Remote attackers can exploit this vulnerability over the network without privileges, though it requires high attack complexity and user interaction, such as visiting a malicious site or clicking a link. Successful exploitation could result in high-impact confidentiality, integrity, and availability violations, potentially allowing arbitrary code execution within the browser's rendering process.
Mozilla's security advisories (MFSA 2026-20 through 2026-23) and the associated Bugzilla entry confirm the vulnerability was addressed in the listed fixed releases. Security practitioners should prioritize updating affected Firefox and Thunderbird installations to mitigate the risk.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Browser RCE via malicious site visit or link click directly enables drive-by compromise (T1189), exploitation for client execution (T1203), and user execution via malicious link (T1204.001).