Description
Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.
Published: 2026-02-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Use‑after‑free in JavaScript GC component may lead to memory corruption
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free flaw exists in the JavaScript garbage‑collection component of Mozilla products. This vulnerability can cause memory corruption and may lead to crashes or other undefined behavior as a freed memory area is still referenced, classified as CWE‑416.

Affected Systems

Mozilla Firefox and Thunderbird are affected. All releases prior to version 148 are vulnerable; the issue is fixed in Firefox 148 and Thunderbird 148.

Risk and Exploitability

The CVSS score of 8.8 indicates a high severity rating. EPSS is less than 1 %, suggesting that large‑scale exploitation is unlikely at the moment, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves malicious JavaScript content that triggers garbage collection while a freed memory location is still referenced, potentially leading to crashes or memory corruption. The combination of a high severity score and remote exploitation vector warrants rapid remediation.

Generated by OpenCVE AI on April 15, 2026 at 16:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Mozilla Firefox to version 148 or later.
  • Update Thunderbird to version 148 or later.
  • If immediate update is not possible, limit exposure to untrusted web content and avoid executing arbitrary scripts until the patches are applied.

Generated by OpenCVE AI on April 15, 2026 at 16:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148. Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.

Fri, 27 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla thunderbird
Vendors & Products Mozilla
Mozilla firefox
Mozilla thunderbird

Wed, 25 Feb 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Tue, 24 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148. Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
References

Tue, 24 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148.
Title Use-after-free in the JavaScript: GC component
References

Subscriptions

Mozilla Firefox Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T13:54:11.193Z

Reserved: 2026-02-19T15:06:41.117Z

Link: CVE-2026-2795

cve-icon Vulnrichment

Updated: 2026-02-26T20:15:54.848Z

cve-icon NVD

Status : Modified

Published: 2026-02-24T14:16:28.000

Modified: 2026-04-13T15:17:28.800

Link: CVE-2026-2795

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-24T13:33:26Z

Links: CVE-2026-2795 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:15:10Z

Weaknesses