Cyber Posture

CVE-2026-4712

High

Published: 24 March 2026

Published
24 March 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0002 4.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Information disclosure in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely patching of known flaws like CVE-2026-4712, as fixed in specified Firefox and Thunderbird versions.

detect

Enables vulnerability scanning to identify systems running vulnerable versions of Firefox, ESR, or Thunderbird affected by this information disclosure.

prevent

Requires monitoring Mozilla security advisories (e.g., MFSA 2026-20) to promptly learn of and apply patches for this CVE.

Security SummaryAI

CVE-2026-4712 is an information disclosure vulnerability (CWE-200) in the Widget: Cocoa component, affecting Mozilla Firefox, Firefox ESR, and Thunderbird. The issue enables unauthorized access to sensitive data and was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Remote attackers can exploit this vulnerability over the network with low attack complexity, requiring no privileges, no user interaction, and without altering the scope of impact. Successful exploitation results in high confidentiality impact, allowing disclosure of sensitive information from affected systems, while integrity and availability remain unaffected. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Mozilla's security advisories (MFSA 2026-20, MFSA 2026-22, MFSA 2026-23, and MFSA 2026-24), along with Bugzilla entry 2017666, document the vulnerability and recommend updating to the patched versions as the primary mitigation.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 140.9.0 · ≤ 149.0

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Remote unauthenticated info disclosure (CWE-200) with high confidentiality impact directly enables collection of sensitive data from the local system on affected browsers/email clients.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References