Critical (10.0)

Firefox Use-After-Free (CVE-2026-4688)

CVE-2026-4688

Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....

Affected: Mozilla Firefox Mozilla Firefox

Overview

A critical vulnerability, tracked as CVE-2026-4688, has been discovered in Mozilla Firefox and Thunderbird. This flaw is a use-after-free bug within the Disability Access APIs component, which can be exploited to escape the browser’s security sandbox. The vulnerability is rated with the maximum CVSS score of 10.0, indicating severe risk.

Vulnerability Details

In simple terms, a “use-after-free” error occurs when a program continues to use a section of memory after it has been freed or cleared. This creates a window for attackers to corrupt that memory. In this case, the flaw is specifically in the code that handles accessibility features. By crafting a malicious webpage or email, an attacker could trigger this memory corruption to break out of the browser’s protected sandbox environment. A sandbox is a critical security feature that restricts code to a safe space, preventing it from affecting the rest of your operating system.

Affected Software

You are affected if you are running:

  • Firefox versions earlier than 149
  • Firefox ESR (Extended Support Release) versions earlier than 140.9
  • Thunderbird versions earlier than 149
  • Thunderbird ESR versions earlier than 140.9

Impact

If successfully exploited, this vulnerability allows an attacker to execute arbitrary code on your system with the same privileges as the user running the browser or email client. This could lead to a complete compromise of the affected system, enabling data theft, installation of malware, or further network attacks. Such exploits are often bundled with other malware and can lead to significant security incidents. For information on active data breaches, you can review current breach reports.

Remediation and Mitigation

Immediate Action Required: The only complete remediation is to update your software immediately.

  1. Update Your Software:
    • Firefox: Go to Menu > Help > About Firefox. The browser will automatically check for and install version 149 or newer.
    • Thunderbird: Go to Menu > Help > About Thunderbird. The client will automatically check for and install version 149 or newer (140.9 or newer for ESR).
  2. Verify Version: Ensure your application version is at least:
    • Firefox: 149
    • Firefox ESR: 140.9
    • Thunderbird: 149
    • Thunderbird ESR: 140.9
  3. Enable Automatic Updates: Ensure automatic updates are enabled in your application settings to receive future security fixes promptly.

No viable workarounds exist for this flaw. Applying the update is the only secure course of action. Staying informed on such critical patches is essential for maintaining security; you can follow the latest developments in our security news section.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Mozilla Firefox Vulnerabilities

View all Mozilla Firefox vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.