Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2760: Vulnerability in Mozilla Firefox

0
Critical
VulnerabilityCVE-2026-2760cvecve-2026-2760
Published: Tue Feb 24 2026 (02/24/2026, 13:33:00 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox < 148, Firefox ESR < 115.33, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 20:16:23 UTC

Technical Analysis

CVE-2026-2760 is a critical vulnerability identified in Mozilla Firefox and Thunderbird's Graphics: WebRender component, which is responsible for rendering graphics efficiently using GPU acceleration. The vulnerability stems from incorrect boundary condition checks within the WebRender code, classified under CWE-1384, which leads to a sandbox escape. Sandboxing is a security mechanism designed to isolate processes and limit the impact of potential exploits. By escaping the sandbox, an attacker can execute arbitrary code with the privileges of the user running the browser or email client, potentially leading to full system compromise. The vulnerability affects all Firefox versions below 148, Firefox ESR versions below 115.33 and 140.8, and corresponding Thunderbird versions. The CVSS v3.1 base score is 10.0, reflecting the highest severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) that impacts confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been reported in the wild yet, the critical nature and ease of exploitation make this a significant threat. The vulnerability allows remote attackers to bypass sandbox restrictions and execute arbitrary code, potentially leading to data theft, system takeover, or denial of service.

Potential Impact

The impact of CVE-2026-2760 is severe for organizations worldwide. Successful exploitation can lead to complete compromise of user systems running vulnerable Firefox or Thunderbird versions. Attackers can execute arbitrary code remotely without any user interaction or authentication, enabling them to steal sensitive data, install malware, or disrupt services. This is particularly dangerous for organizations relying on Firefox or Thunderbird for web browsing and email communications, as it undermines the fundamental security boundary provided by sandboxing. The vulnerability also poses risks to critical infrastructure, government agencies, financial institutions, and enterprises with high-value data. Given the widespread use of Firefox and Thunderbird globally, the potential for large-scale exploitation exists, especially if weaponized exploit code becomes available. The absence of known exploits currently provides a window for mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

To mitigate CVE-2026-2760, organizations should prioritize updating affected Mozilla Firefox and Thunderbird versions to 148 or later, or ESR versions 115.33 and 140.8 or later, as soon as patches are released. Until patches are available, organizations can implement temporary mitigations such as disabling WebRender via browser configuration settings (e.g., setting gfx.webrender.all to false in about:config), though this may impact performance. Employing endpoint protection solutions with behavior-based detection can help identify exploitation attempts. Network-level controls should monitor and restrict access to Firefox and Thunderbird update servers to ensure timely patch deployment. Additionally, organizations should enforce the principle of least privilege for user accounts to limit the impact of potential exploits. Regular vulnerability scanning and threat intelligence monitoring for emerging exploit code are also recommended. User education on safe browsing and email practices remains important but is insufficient alone given the lack of required user interaction for exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-02-19T15:05:23.107Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699daf6bbe58cf853bdddd7e

Added to database: 2/24/2026, 2:02:19 PM

Last enriched: 3/3/2026, 8:16:23 PM

Last updated: 4/10/2026, 11:20:25 PM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses