Cyber Posture

CVE-2026-6774

Medium

Published: 21 April 2026

Published
21 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS Score 0.0004 11.2th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Description

Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Thunderbird 150.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-693

Implements a reliable, tamperproof protection mechanism whose completeness can be assured.

addresses: CWE-693

Procedures for training on protection mechanisms reduce the chance of protection mechanism failures being present or exploitable.

addresses: CWE-693

Documented procedures to implement assessment, authorization, and monitoring controls prevent these protection mechanisms from failing due to undefined processes.

addresses: CWE-693

Direct evaluation of whether controls produce desired security outcomes detects protection mechanism failures and enables remediation.

addresses: CWE-693

Requires assessment that protection mechanisms are correctly implemented and producing intended security outcomes.

addresses: CWE-693

The POA&M process ensures identified weaknesses in protection mechanisms are documented and scheduled for remediation, reducing the duration they remain exploitable.

addresses: CWE-693

Ongoing control assessments and analysis of monitoring data enable timely detection and response when protection mechanisms fail.

addresses: CWE-693

Impact analysis identifies changes that could weaken or disable existing protection mechanisms.

Security SummaryAI

CVE-2026-6774 is a mitigation bypass vulnerability in the DOM Security component of Mozilla Firefox and Thunderbird. It affects versions prior to Firefox 150 and Thunderbird 150, where attackers can circumvent security protections in the Document Object Model handling. The issue is classified under CWE-693 (Protection Mechanism Failure) with a CVSS v3.1 base score of 5.4 (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N), indicating medium severity due to network accessibility, low attack complexity, and limited impact on confidentiality and integrity.

Exploitation requires a low-privileged attacker (PR:L) with network access to deliver a malicious payload, combined with user interaction (UI:R), such as clicking a link or engaging with crafted content. Successful exploitation changes the scope (S:C) to allow limited disclosure of sensitive information (C:L) or modification of data (I:L) within the browser or email client context, bypassing intended DOM security mitigations without impacting availability.

Mozilla's security advisories (MFSA 2026-30 and MFSA 2026-33) confirm the fix in Firefox 150 and Thunderbird 150, recommending immediate upgrades to patched versions. Additional details are available in Bugzilla ticket 2016915.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 150.0
mozilla
thunderbird
≤ 150.0

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.001 Malicious Link Execution
An adversary may rely upon a user clicking a malicious link in order to gain execution.
Why these techniques?

Browser DOM mitigation bypass directly enables client-side exploitation (T1203) via malicious links or crafted web content (T1204.001, T1189 drive-by).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

References