Critical (9.8)

Firefox, Thunderbird memory corruption (CVE-2026-5734)

CVE-2026-5734

Memory safety bugs present in Firefox ESR 140.9.0, Thunderbird ESR 140.9.0, Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with en...

Affected: Mozilla Firefox Mozilla Firefox Mozilla Thunderbird Mozilla Thunderbird

Overview

A critical memory safety vulnerability, tracked as CVE-2026-5734, has been identified in multiple versions of Mozilla Firefox and Thunderbird. The flaw stems from memory corruption bugs that could allow an attacker to execute arbitrary code on a victim’s system simply by having them visit a malicious webpage or open a specially crafted email.

Affected Software

The vulnerability impacts a wide range of versions:

  • Firefox versions prior to 149.0.2
  • Firefox ESR versions prior to 140.9.1
  • Thunderbird versions prior to 149.0.2
  • Thunderbird ESR versions prior to 140.9.1

Impact and Exploitation

With a maximum CVSS score of 9.8, this is a severe remote code execution (RCE) vulnerability. The attack vector is network-based, requires no user privileges, and needs no user interaction beyond loading malicious content. This makes it highly exploitable. An attacker could craft a website or email that, when processed by the vulnerable application, triggers memory corruption to run their own code, potentially leading to a complete compromise of the system. For the latest on such threats, monitor our security news.

Remediation and Mitigation

The only complete mitigation is immediate patching. All users and administrators must update their software to the latest secure versions.

Action Steps:

  1. Update Firefox: Ensure your Firefox browser is updated to version 149.0.2 or later. Firefox ESR must be updated to 140.9.1 or later.
  2. Update Thunderbird: Ensure your Thunderbird email client is updated to version 149.0.2 or later. Thunderbird ESR must be updated to 140.9.1 or later.
  3. Enable Automatic Updates: Verify that automatic updates are enabled in both applications to receive future security fixes promptly.
  4. No Workaround: There is no effective configuration workaround. Patching is mandatory.

Security Insight

This vulnerability underscores the persistent critical risk posed by memory safety issues in foundational software written in languages like C++. It echoes historical patterns where such flaws in browsers and email clients have been rapidly weaponized in exploit chains. Mozilla’s proactive presumption of exploitability for memory corruption bugs reflects a mature security stance, treating them as critical until proven otherwise, which is a best practice more vendors should adopt. For analysis of past incidents stemming from similar flaws, review historical breach reports.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other Mozilla Firefox Vulnerabilities

View all Mozilla Firefox vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.