CVE-2026-4691
Published: 24 March 2026
Description
Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the CVE by requiring timely remediation through patching to the fixed versions of Firefox and Thunderbird.
Provides memory protections like ASLR and non-executable memory to mitigate use-after-free exploitation leading to arbitrary code execution.
Enables vulnerability scanning to identify systems running vulnerable versions of Firefox or Thunderbird affected by this use-after-free flaw.
Security SummaryAI
CVE-2026-4691 is a use-after-free vulnerability (CWE-416) in the CSS Parsing and Computation component of Mozilla products. It affects Firefox versions prior to 149, Firefox ESR prior to 115.34 and 140.9, Thunderbird prior to 149, and Thunderbird prior to 140.9. The vulnerability was published on 2026-03-24 and carries a CVSS v3.1 base score of 9.8, indicating critical severity.
The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N) in an unchanged impact scope (S:U). Attackers can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing arbitrary code execution or other severe compromises within the affected browser or mail client context.
Mozilla fixed the issue in Firefox 149, Firefox ESR 115.34 and 140.9, Thunderbird 149, and Thunderbird 140.9. Security practitioners should consult Mozilla Security Advisories MFSA2026-20, MFSA2026-21, MFSA2026-22, and MFSA2026-23, along with Bugzilla bug 2017512, for detailed patch information and mitigation guidance.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in CSS parsing enables remote arbitrary code execution in browser/email client (AV:N, UI:N), directly mapping to drive-by delivery of malicious web content and client-side exploitation for code execution.