CVE-2026-4723

Mozilla · Firefox and Thunderbird

A use-after-free vulnerability in the JavaScript Engine of Mozilla Firefox and Thunderbird allows for critical remote code execution.

Executive summary

Mozilla Firefox and Thunderbird contain a critical use-after-free vulnerability in their JavaScript Engine that enables unauthenticated remote code execution.

Vulnerability

This use-after-free (UAF) vulnerability is located within the core JavaScript Engine. It allows an unauthenticated attacker to manipulate memory objects via malicious scripts, resulting in the execution of arbitrary code on the victim's machine.

Business impact

This vulnerability poses a severe risk to data confidentiality and system availability. An attacker who successfully exploits this flaw can gain complete control over the user's browser session and the underlying operating system. The CVSS score of 9.8 reflects the high severity and the critical need for immediate remediation.

Remediation

Immediate Action: Update Firefox and Thunderbird to version 149 or higher immediately to resolve this memory corruption issue.

Proactive Monitoring: Monitor for unexpected browser crashes and use EDR tools to detect shellcode execution or other indicators of browser-based attacks.

Compensating Controls: Utilize web filtering to block access to high-risk or uncategorized websites that may host malicious JavaScript.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The criticality of this vulnerability necessitates immediate action. We recommend that IT administrators prioritize the deployment of the latest Mozilla updates to all endpoints to prevent unauthenticated remote code execution.