Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0887: Vulnerability in Mozilla Firefox

0
Medium
VulnerabilityCVE-2026-0887cvecve-2026-0887
Published: Tue Jan 13 2026 (01/13/2026, 13:30:57 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:19:55 UTC

Technical Analysis

CVE-2026-0887 is a vulnerability identified in Mozilla Firefox and Thunderbird's PDF Viewer component, specifically affecting Firefox versions below 147 and ESR versions below 140.7, as well as corresponding Thunderbird versions. The issue is classified as a clickjacking vulnerability that leads to information disclosure (CWE-497). Clickjacking typically involves tricking a user into clicking on something different from what the user perceives, potentially exposing sensitive information. In this case, the vulnerability allows an attacker to craft malicious web content that can overlay or manipulate the PDF Viewer interface, causing the user to inadvertently reveal information contained within PDF documents rendered by the browser. The CVSS v3.1 base score of 4.3 reflects a medium severity level, with vector AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N indicating that the attack can be launched remotely over the network without privileges but requires user interaction, affects confidentiality only, and does not impact integrity or availability. No known exploits have been reported in the wild, and no patches are linked yet, suggesting either a recent discovery or pending remediation. The vulnerability's exploitation scope is limited to users who open maliciously crafted web pages containing embedded PDFs or manipulated PDF viewer elements. Since the attack requires user interaction, social engineering or phishing techniques may be used to lure victims. The vulnerability's root cause lies in insufficient protection against clickjacking in the PDF Viewer, allowing attackers to bypass UI protections and extract information. This type of vulnerability can be leveraged to gather sensitive data from documents viewed in the browser, potentially exposing confidential information to attackers.

Potential Impact

For European organizations, the primary impact of CVE-2026-0887 is the potential unauthorized disclosure of sensitive information contained within PDF documents viewed in Firefox or Thunderbird. This could lead to leakage of confidential business data, intellectual property, or personal information, undermining privacy and compliance with regulations such as GDPR. Although the vulnerability does not affect system integrity or availability, the confidentiality breach can have reputational and legal consequences. Organizations relying heavily on Firefox or Thunderbird for document handling and communication are at risk, especially if users are targeted with phishing campaigns that exploit this vulnerability. The requirement for user interaction and the absence of known exploits reduce the immediate risk but do not eliminate the threat, particularly in high-value sectors such as finance, government, and critical infrastructure. Additionally, the vulnerability could be chained with other exploits to increase impact, though no such cases are currently documented.

Mitigation Recommendations

To mitigate CVE-2026-0887, European organizations should prioritize updating Mozilla Firefox and Thunderbird to versions 147 and 140.7 ESR or later once patches are released. Until then, organizations can implement strict Content Security Policies (CSP) to prevent unauthorized framing or embedding of PDF Viewer components, reducing clickjacking attack surfaces. Educating users about the risks of clicking on suspicious links or interacting with unknown web content can reduce successful exploitation. Network-level protections such as web filtering to block known malicious URLs and phishing detection tools should be enhanced. Administrators can consider disabling or restricting the use of the built-in PDF Viewer in Firefox via configuration policies, forcing users to download PDFs and open them in dedicated, secure PDF readers with robust security controls. Monitoring for unusual user behavior or data exfiltration attempts related to PDF handling can provide early detection. Finally, staying informed through Mozilla security advisories and applying updates promptly is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-01-13T13:30:57.650Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69664f11a60475309f2ea323

Added to database: 1/13/2026, 1:56:33 PM

Last enriched: 1/21/2026, 2:19:55 AM

Last updated: 2/7/2026, 11:19:06 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats