Firefox Use-After-Free (CVE-2026-4696)
CVE-2026-4696
Use-after-free in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....
Overview
A critical security vulnerability, tracked as CVE-2026-4696, has been identified in Mozilla Firefox and Thunderbird. This flaw is a use-after-free error within the browser’s Layout: Text and Fonts component. Successful exploitation could allow an attacker to execute arbitrary code on a victim’s system simply by having them view a specially crafted web page or email message.
Vulnerability Details
In simple terms, a use-after-free vulnerability occurs when a program continues to use a section of memory after it has been freed or made available for other purposes. This is similar to discarding a document but then trying to read from the empty file folder; the contents are unpredictable and can be manipulated by an attacker. In this case, the flaw exists in the code that handles text layout and font rendering, a core function of any web browser or email client.
Affected Software
The following versions are confirmed vulnerable and require immediate updating:
- Firefox versions prior to 149
- Firefox ESR versions prior to 115.34
- Firefox ESR versions prior to 140.9
- Thunderbird versions prior to 149
- Thunderbird versions prior to 140.9
Impact and Risk
This vulnerability is rated CRITICAL with a CVSS score of 9.8. The primary risk is remote code execution (RCE). An attacker could create a malicious website or HTML email that, when opened, crashes the application and potentially allows the attacker to run programs on the target computer. This could lead to a full system compromise, data theft, or installation of malware. For organizations, this poses a significant data breach risk. You can review historical incidents to understand potential impacts in our breach reports.
Remediation and Mitigation
The only complete solution is to update the affected software immediately.
Action Steps:
- Update Immediately: Ensure all instances of Firefox and Thunderbird are updated to the patched versions. The fixed versions are Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
- Enable Automatic Updates: Verify that automatic updates are enabled in your browser and email client settings to receive future security patches promptly.
- Enterprise Deployment: System administrators should deploy the updated packages across their networks as a priority.
There are no effective workarounds for this vulnerability. Users must apply the provided security updates to eliminate the risk. For the latest updates on this and other threats, monitor our security news section.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....
Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....
Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....
Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability affects Firefox < 149 and Thunderbird < 149....
Other Mozilla Firefox Vulnerabilities
Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with en...
Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been expl...
Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....
Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....