Critical (9.8)

Firefox Use-After-Free (CVE-2026-4696)

CVE-2026-4696

Use-after-free in the Layout: Text and Fonts component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....

Affected: Mozilla Firefox Mozilla Firefox Mozilla Firefox

Overview

A critical security vulnerability, tracked as CVE-2026-4696, has been identified in Mozilla Firefox and Thunderbird. This flaw is a use-after-free error within the browser’s Layout: Text and Fonts component. Successful exploitation could allow an attacker to execute arbitrary code on a victim’s system simply by having them view a specially crafted web page or email message.

Vulnerability Details

In simple terms, a use-after-free vulnerability occurs when a program continues to use a section of memory after it has been freed or made available for other purposes. This is similar to discarding a document but then trying to read from the empty file folder; the contents are unpredictable and can be manipulated by an attacker. In this case, the flaw exists in the code that handles text layout and font rendering, a core function of any web browser or email client.

Affected Software

The following versions are confirmed vulnerable and require immediate updating:

  • Firefox versions prior to 149
  • Firefox ESR versions prior to 115.34
  • Firefox ESR versions prior to 140.9
  • Thunderbird versions prior to 149
  • Thunderbird versions prior to 140.9

Impact and Risk

This vulnerability is rated CRITICAL with a CVSS score of 9.8. The primary risk is remote code execution (RCE). An attacker could create a malicious website or HTML email that, when opened, crashes the application and potentially allows the attacker to run programs on the target computer. This could lead to a full system compromise, data theft, or installation of malware. For organizations, this poses a significant data breach risk. You can review historical incidents to understand potential impacts in our breach reports.

Remediation and Mitigation

The only complete solution is to update the affected software immediately.

Action Steps:

  1. Update Immediately: Ensure all instances of Firefox and Thunderbird are updated to the patched versions. The fixed versions are Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
  2. Enable Automatic Updates: Verify that automatic updates are enabled in your browser and email client settings to receive future security patches promptly.
  3. Enterprise Deployment: System administrators should deploy the updated packages across their networks as a priority.

There are no effective workarounds for this vulnerability. Users must apply the provided security updates to eliminate the risk. For the latest updates on this and other threats, monitor our security news section.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Mozilla Firefox Vulnerabilities

View all Mozilla Firefox vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.