Impact
A use‑after‑free flaw in the Disability Access APIs component enables a sandbox escape, allowing attackers to cause the browser or mail client to execute code that it normally would not be permitted to run. The vulnerability corresponds to the Use After Free weakness (CWE‑416) and involves improper handling of certain memory resources (CWE‑825).
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected. Versions prior to Firefox 149 and Thunderbird 149, including the extended support releases Firefox ESR 140.9 and Thunderbird ESR 140.9, contain the bug; subsequent releases contain the fix.
Risk and Exploitability
The CVSS score of 9.6 indicates a high‑severity risk, yet the EPSS score of less than 1 % suggests that exploitation is currently unlikely and the vulnerability is not listed in the CISA KEV catalog. Based on the CVE description, it is inferred that an attacker would need to supply malicious sandboxed content—such as a crafted web page or document—to trigger the use‑after‑free; if successful, the attacker could achieve full process compromise. The attack vector is inferred to be via privileged sandboxed content rather than a direct remote network exploit.
OpenCVE Enrichment
Debian DLA
Debian DSA