Critical (9.8)

Firefox Use-After-Free (CVE-2026-4701)

CVE-2026-4701

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 149, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9....

Affected: Mozilla Firefox Mozilla Firefox

Overview

A critical security vulnerability, tracked as CVE-2026-4701, has been identified in Mozilla’s Firefox and Thunderbird applications. This flaw is a use-after-free memory corruption bug within the JavaScript engine, a core component responsible for processing web and email content. Successful exploitation could allow an attacker to take control of an affected system.

Vulnerability Details

In simple terms, a use-after-free error occurs when a program continues to use a section of memory after it has been freed or made available for other data. This creates an unstable state that a skilled attacker can manipulate. For CVE-2026-4701, this flaw exists in the JavaScript engine. An attacker could craft a malicious website or a specially formatted email (in Thunderbird’s case) containing JavaScript. When this content is processed by the vulnerable browser or email client, it could trigger the memory corruption.

Impact and Severity

This vulnerability is rated CRITICAL with a CVSS score of 9.8. The primary risk is remote code execution (RCE). This means an attacker could exploit this flaw without any user interaction beyond viewing a webpage or a malicious email message, potentially leading to:

  • Full compromise of the affected computer.
  • Installation of malware, spyware, or ransomware.
  • Theft of sensitive data, such as passwords, cookies, and personal files.
  • Integration of the system into a botnet.

Exploitation of such flaws is often a precursor to data breaches. For information on recent incidents, you can review public breach reports.

Affected Software

  • Firefox versions prior to 149
  • Firefox ESR (Extended Support Release) versions prior to 140.9
  • Thunderbird versions prior to 149
  • Thunderbird ESR versions prior to 140.9

Remediation and Mitigation

Immediate Action Required: The only complete mitigation is to update the affected software to the latest patched version.

  1. Update Your Software:

    • Firefox: The application should auto-update. You can manually trigger an update by going to Menu > Help > About Firefox. It will check and install version 149 or newer.
    • Firefox ESR: Organizations using the ESR branch must update to version 140.9.
    • Thunderbird: Go to Menu > Help > About Thunderbird to check for and install updates to version 149 (or 140.9 for ESR).
  2. Restart: Ensure you completely close and restart the application after updating for the patch to take effect.

  3. Verify: After restarting, navigate back to “About Firefox” or “About Thunderbird” to confirm you are running a patched version (149 / 140.9 or higher).

There is no effective workaround for this vulnerability. Disabling JavaScript is not a practical mitigation as it breaks core functionality for most websites and modern email. Applying the provided update is essential.

Stay informed about critical patches and cybersecurity threats by following the latest security news.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Mozilla Firefox Vulnerabilities

View all Mozilla Firefox vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.