Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2790: Vulnerability in Mozilla Firefox

0
High
VulnerabilityCVE-2026-2790cvecve-2026-2790
Published: Tue Feb 24 2026 (02/24/2026, 13:33:21 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, and Thunderbird < 140.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 19:04:09 UTC

Technical Analysis

CVE-2026-2790 is a vulnerability identified in Mozilla Firefox and Thunderbird products, specifically affecting Firefox versions earlier than 148 and Thunderbird versions earlier than 148, including Extended Support Release (ESR) versions below 140.8. The flaw resides in the Networking: JAR component, which is responsible for handling Java Archive (JAR) files within the browser environment. This vulnerability allows a same-origin policy bypass, a critical security mechanism that restricts how documents or scripts loaded from one origin can interact with resources from another origin. By exploiting this bypass, an attacker can circumvent these restrictions, potentially gaining unauthorized access to sensitive data or executing malicious scripts across origins that should be isolated. The vulnerability is classified under CWE-346, which relates to improper verification of cryptographic signatures, indicating a failure in enforcing security boundaries. The CVSS v3.1 base score is 8.8, reflecting high severity with attack vector being network-based (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The impact covers confidentiality, integrity, and availability (C:H/I:H/A:H), meaning the attacker can compromise all three security aspects. Although no known exploits have been reported in the wild as of now, the potential for exploitation exists, especially through crafted web content that tricks users into interaction. The vulnerability affects a broad user base given Firefox's global market penetration and Thunderbird's use in email clients. The lack of patch links suggests that fixes may still be pending or in development, underscoring the urgency for users and organizations to monitor updates closely.

Potential Impact

The impact of CVE-2026-2790 is significant for organizations worldwide relying on Firefox and Thunderbird for web browsing and email communications. Successful exploitation can lead to unauthorized access to sensitive information, including cookies, session tokens, or other confidential data accessible via the browser. Attackers could execute cross-origin scripts, potentially leading to account takeover, data theft, or manipulation of web application behavior. The integrity of data and communications can be compromised, and availability may be affected if attackers disrupt browser or email client operations. This vulnerability poses a risk to any environment where these products are used, including corporate, governmental, and personal contexts. Organizations handling sensitive or regulated data are particularly vulnerable, as exploitation could lead to data breaches, compliance violations, and reputational damage. The requirement for user interaction means social engineering or phishing tactics could be employed to trigger the exploit, increasing the threat surface. Given the widespread use of Firefox and Thunderbird globally, the scope of affected systems is extensive, amplifying the potential impact.

Mitigation Recommendations

To mitigate CVE-2026-2790, organizations should prioritize upgrading affected Firefox and Thunderbird versions to 148 or later, or ESR versions 140.8 or later, as soon as patches become available. Until patches are released, users should be advised to avoid visiting untrusted or suspicious websites and to be cautious with email links or attachments that could trigger the vulnerability. Implementing network-level protections such as web filtering and intrusion prevention systems can help block malicious content exploiting this flaw. Organizations should enforce strict content security policies (CSP) to limit the impact of cross-origin script execution. User education on phishing and social engineering risks is critical to reduce the likelihood of user interaction-based exploitation. Monitoring browser and email client logs for unusual activity may help detect exploitation attempts. Additionally, disabling or restricting the use of the JAR component where feasible can reduce exposure. Security teams should stay informed through Mozilla security advisories for official patches and updates.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2026-02-19T15:06:33.357Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699daf70be58cf853bdde22a

Added to database: 2/24/2026, 2:02:24 PM

Last enriched: 3/3/2026, 7:04:09 PM

Last updated: 4/10/2026, 1:39:09 PM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses