CVE-2026-4698
Mozilla · Firefox and Thunderbird
A critical JIT miscompilation vulnerability in the JavaScript Engine of Mozilla browsers allows for remote code execution via malicious scripts.
Executive summary
A critical flaw in the JavaScript Just-In-Time (JIT) compiler of Mozilla Firefox and Thunderbird allows unauthenticated attackers to execute arbitrary code on target systems.
Vulnerability
This vulnerability involves a JIT miscompilation within the JavaScript Engine. An unauthenticated attacker can exploit this by serving a malicious script that triggers an incorrect compilation path, leading to memory corruption and code execution.
Business impact
This vulnerability enables Remote Code Execution (RCE), which could result in a total loss of system integrity and confidentiality. Attackers can leverage this to steal session cookies, access local files, or deploy ransomware. The CVSS score of 9.8 indicates that this is a highly critical threat that requires immediate remediation.
Remediation
Immediate Action: Update Firefox and Thunderbird to version 149 or the latest available ESR releases to patch the JavaScript Engine.
Proactive Monitoring: Monitor for anomalous JavaScript execution patterns and high CPU usage by browser processes, which may indicate exploitation attempts.
Compensating Controls: Disable JIT compilation via browser configuration if updates cannot be applied immediately, though this will significantly impact performance.
Exploitation status
Public Exploit Available: No
Analyst recommendation
The risk of remote code execution via the JavaScript engine is a top-tier security concern. We strongly recommend that all organizations apply the vendor-provided patches immediately to mitigate the risk of unauthenticated attacks targeting end-users.