CVE-2026-4711
Mozilla · Firefox and Thunderbird
A use-after-free vulnerability in the Widget: Cocoa component of Mozilla products on macOS allows for remote code execution via malicious web interaction.
Executive summary
Mozilla Firefox and Thunderbird on macOS are vulnerable to a critical use-after-free flaw in the Cocoa widget component that could lead to full system compromise.
Vulnerability
This is a use-after-free vulnerability in the "Widget: Cocoa" component, specifically affecting the macOS versions of the software. An unauthenticated attacker can trigger this through malicious web content to execute arbitrary code.
Business impact
Successful exploitation allows an attacker to execute code with the user's permissions, potentially leading to the theft of sensitive data, including keychain items and local files. The CVSS score of 9.8 highlights the critical risk to macOS users within the organization.
Remediation
Immediate Action: Update all macOS installations of Firefox and Thunderbird to version 149 or the latest ESR release immediately.
Proactive Monitoring: Monitor macOS systems for suspicious processes and review security logs for anomalies related to browser execution.
Compensating Controls: Implement Gatekeeper and other macOS-native security features to restrict the execution of unsigned or untrusted code.
Exploitation status
Public Exploit Available: No
Analyst recommendation
Organizations with a significant macOS footprint must treat this as a critical priority. Ensure that all Apple workstations are updated to the latest version of Mozilla software to mitigate the risk of remote code execution via this Cocoa-specific flaw.