Cyber Posture

CVE-2026-4691

Critical

Published: 24 March 2026

Published
24 March 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0004 11.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE by requiring timely remediation through patching to the fixed versions of Firefox and Thunderbird.

prevent

Provides memory protections like ASLR and non-executable memory to mitigate use-after-free exploitation leading to arbitrary code execution.

detect

Enables vulnerability scanning to identify systems running vulnerable versions of Firefox or Thunderbird affected by this use-after-free flaw.

Security SummaryAI

CVE-2026-4691 is a use-after-free vulnerability (CWE-416) in the CSS Parsing and Computation component of Mozilla products. It affects Firefox versions prior to 149, Firefox ESR prior to 115.34 and 140.9, Thunderbird prior to 149, and Thunderbird prior to 140.9. The vulnerability was published on 2026-03-24 and carries a CVSS v3.1 base score of 9.8, indicating critical severity.

The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N) in an unchanged impact scope (S:U). Attackers can achieve high impacts on confidentiality, integrity, and availability (C:H/I:H/A:H), potentially allowing arbitrary code execution or other severe compromises within the affected browser or mail client context.

Mozilla fixed the issue in Firefox 149, Firefox ESR 115.34 and 140.9, Thunderbird 149, and Thunderbird 140.9. Security practitioners should consult Mozilla Security Advisories MFSA2026-20, MFSA2026-21, MFSA2026-22, and MFSA2026-23, along with Bugzilla bug 2017512, for detailed patch information and mitigation guidance.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.34.0 · ≤ 149.0 · 128.0 — 140.9.0

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Use-after-free in CSS parsing enables remote arbitrary code execution in browser/email client (AV:N, UI:N), directly mapping to drive-by delivery of malicious web content and client-side exploitation for code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References