Description
Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability was fixed in Firefox 147.0.2.
Published: 2026-01-27
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a use‑after‑free flaw in Firefox’s Layout: Scrolling and Overflow component. The flaw can corrupt memory when the component attempts to access a deallocated object, potentially allowing an attacker to execute arbitrary code or crash the browser. The weakness, identified as CWE‑416, indicates that improper handling of freed memory can lead to data integrity and confidentiality losses if an attacker can control the content that causes the overflow. The description does not explicitly mention successful exploitation, but typical use‑after‑free bugs of this type can lead to remote code execution in a privileged browser process.

Affected Systems

Mozilla Firefox versions earlier than 147.0.2 are vulnerable. The patch was applied in Firefox 147.0.2, so any build prior to that is at risk. The issue affects all platforms supported by Firefox where the component is enabled.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity. However, the EPSS score is below 1%, suggesting that the likelihood of current exploitation is low and it is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector requires an attacker to deliver or manipulate content in a context that causes the scrolling and overflow layout logic to reuse freed memory – most likely through a crafted web page or plugin. No publicly disclosed exploits are known, and the vulnerability appears to be in the early stages of exploitation potential.

Generated by OpenCVE AI on April 15, 2026 at 15:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Firefox to version 147.0.2 or later to receive the official patch
  • Configure the browser to automatically install updates so that future security fixes are applied promptly
  • If an immediate upgrade is not possible, restrict the use of affected content by disabling advanced layout features or employing content filtering until the patch is applied

Generated by OpenCVE AI on April 15, 2026 at 15:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2. Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability was fixed in Firefox 147.0.2.

Sat, 28 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 02 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Fri, 30 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*

Wed, 28 Jan 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Vendors & Products Mozilla
Mozilla firefox

Tue, 27 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Description Use-after-free in the Layout: Scrolling and Overflow component. This vulnerability affects Firefox < 147.0.2.
Title Use-after-free in the Layout: Scrolling and Overflow component
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T13:53:08.241Z

Reserved: 2026-01-27T15:11:51.078Z

Link: CVE-2026-24869

cve-icon Vulnrichment

Updated: 2026-01-27T16:11:46.924Z

cve-icon NVD

Status : Modified

Published: 2026-01-27T16:16:36.283

Modified: 2026-04-13T15:17:19.507

Link: CVE-2026-24869

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-27T15:58:48Z

Links: CVE-2026-24869 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:00:15Z

Weaknesses