Description
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Published: 2026-03-24
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

An integer overflow fault caused by incorrect boundary checks in the XPCOM component can allow a sandbox escape. The flaw permits an attacker to feed crafted data that overflows a signed integer, enabling a boundary failure and ultimately breaking out of the hardened execution context. The escape can provide the attacker with the ability to execute arbitrary code that runs with the permissions of the compromised application, thereby threatening confidentiality, integrity, and availability of the entire system.

Affected Systems

Mozilla Firefox versions earlier than 149, including the ESR 115.34 and ESR 140.9 releases, and Mozilla Thunderbird versions earlier than 149, including the ESR 140.9 release, are affected.

Risk and Exploitability

The vulnerability has a CVSS v3 score of 10 and an EPSS probability of less than 1 %. It is not listed in the CISA KEV catalog. The likely attack vector involves an attacker interacting with the affected software to supply malicious data that triggers the integer overflow, which can lead to a system‑wide compromise once the sandbox is escaped.

Generated by OpenCVE AI on April 13, 2026 at 16:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patched releases of Firefox 149 or the ESR updates 115.34 and 140.9, and Thunderbird 149 or 140.9 immediately.
  • If a patch cannot be applied immediately, isolate the affected systems from untrusted networks and monitor for anomalous activity.
  • Validate that no older versions remain in use and keep up with vendor advisories for future updates.

Generated by OpenCVE AI on April 13, 2026 at 16:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4510-1 firefox-esr security update
Debian DLA Debian DLA DLA-4511-1 thunderbird security update
Debian DSA Debian DSA DSA-6178-1 firefox-esr security update
Debian DSA Debian DSA DSA-6179-1 thunderbird security update
History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla thunderbird
Weaknesses CWE-754
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
Vendors & Products Mozilla thunderbird

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CWE-190
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla firefox Esr
Vendors & Products Mozilla
Mozilla firefox
Mozilla firefox Esr

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
References

Tue, 24 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9.
Title Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
References

Subscriptions

Mozilla Firefox Firefox Esr Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T13:48:38.103Z

Reserved: 2026-03-23T23:21:39.901Z

Link: CVE-2026-4689

cve-icon Vulnrichment

Updated: 2026-03-25T13:17:12.774Z

cve-icon NVD

Status : Modified

Published: 2026-03-24T13:16:04.737

Modified: 2026-04-13T15:17:37.393

Link: CVE-2026-4689

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-24T12:30:23Z

Links: CVE-2026-4689 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:43:41Z

Weaknesses