Description
Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.
Published: 2026-02-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Use–after–free vulnerabilities arise when an application accesses memory after it has been freed. In this instance the JavaScript garbage collector in Mozilla products can operate on deallocated objects, allowing an attacker to corrupt memory or execute arbitrary code at a chosen address. This flaw can lead to remote code execution, denial of service, or host compromise, depending on how the attacker injects malicious JavaScript.

Affected Systems

The vulnerability applies to Mozilla Firefox and Mozilla Thunderbird. Both products have incorporated the fix in release 148, so versions prior to 148 are affected while newer releases are not listed as vulnerable.

Risk and Exploitability

The CVSS score of 8.8 categorizes the issue as high severity, and the EPSS score of less than 1% suggests that exploit attempts are currently infrequent but feasible. The vulnerability is not present in the CISA Known Exploited Vulnerabilities list, indicating no known mass‑scale exploitation. Based on the description, it is inferred that attackers would most likely leverage malicious web pages or crafted email attachments that deliver JavaScript to trigger the use‑after‑free through the applications’ normal execution paths.

Generated by OpenCVE AI on April 15, 2026 at 16:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mozilla Firefox to version 148 or later to apply the use‑after‑free fix.
  • Upgrade Mozilla Thunderbird to version 148 or later to apply the use‑after‑free fix.
  • If an immediate upgrade cannot be performed, temporarily disable or restrict JavaScript execution in the affected applications until the patch is applied.
  • Monitor application logs for crash events or abnormal memory usage that may indicate exploitation attempts.

Generated by OpenCVE AI on April 15, 2026 at 16:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148. Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.

Sat, 28 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Sat, 28 Feb 2026 00:15:00 +0000


Wed, 25 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla thunderbird
Vendors & Products Mozilla
Mozilla firefox
Mozilla thunderbird

Tue, 24 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
Description Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148. Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148 and Thunderbird < 148.
References

Tue, 24 Feb 2026 14:00:00 +0000

Type Values Removed Values Added
Description Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 148.
Title Use-after-free in the JavaScript: GC component
References

Subscriptions

Mozilla Firefox Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T13:54:17.607Z

Reserved: 2026-02-19T15:06:45.386Z

Link: CVE-2026-2797

cve-icon Vulnrichment

Updated: 2026-02-26T20:15:50.844Z

cve-icon NVD

Status : Modified

Published: 2026-02-24T14:16:28.200

Modified: 2026-04-13T15:17:29.217

Link: CVE-2026-2797

cve-icon Redhat

Severity : Important

Publid Date: 2026-02-24T13:33:27Z

Links: CVE-2026-2797 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:15:10Z

Weaknesses