Description
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Published: 2026-03-24
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution via sandbox escape
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from incorrect boundary conditions and integer overflow in the XPCOM component of Mozilla products, allowing a sandbox escape that can execute arbitrary code with full system privileges. The flaw can compromise confidentiality, integrity, and availability of the host. It is a buffer overflow (CWE‑120), integer overflow (CWE‑190), and unchecked buffer bounds (CWE‑754) issue.

Affected Systems

Affected products include Mozilla Firefox and Thunderbird, both in standard and ESR releases. Vulnerable Firefox releases are all versions below 149, ESR releases below 115.34 and below 140.9, and Thunderbird releases below 149 or ESR below 140.9. All versions represented by the provided CPE strings fall under these ranges.

Risk and Exploitability

With a CVSS score of 10 the vulnerability is rated critical, and the EPSS score of less than 1% suggests low public exploit probability but does not diminish its severity. The flaw is not listed in CISA’s KEV catalog. Attacks likely involve malicious web content or email that triggers the integer overflow, leading to a full sandbox escape with attacker‑controlled code execution. Prompt remediation is essential to eliminate this high‑impact risk.

Generated by OpenCVE AI on March 25, 2026 at 16:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mozilla Firefox to version 149 or later (or ESR 115.34 or 140.9), and upgrade Mozilla Thunderbird to version 149 or later (or ESR 140.9).
  • Verify that the installed versions meet the minimum requirements via the about:config page or help menu.
  • Keep browsers patched with subsequent security releases to protect against related vulnerabilities.

Generated by OpenCVE AI on March 25, 2026 at 16:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4510-1 firefox-esr security update
Debian DLA Debian DLA DLA-4511-1 thunderbird security update
Debian DSA Debian DSA DSA-6178-1 firefox-esr security update
Debian DSA Debian DSA DSA-6179-1 thunderbird security update
History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla thunderbird
Weaknesses CWE-754
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*
Vendors & Products Mozilla thunderbird

Wed, 25 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120
CWE-190
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Mozilla firefox Esr
Vendors & Products Mozilla
Mozilla firefox
Mozilla firefox Esr

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
References

Tue, 24 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9.
Title Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
References

Subscriptions

Mozilla Firefox Firefox Esr Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-13T13:48:38.103Z

Reserved: 2026-03-23T23:21:39.901Z

Link: CVE-2026-4689

cve-icon Vulnrichment

Updated: 2026-03-25T13:17:12.774Z

cve-icon NVD

Status : Modified

Published: 2026-03-24T13:16:04.737

Modified: 2026-04-13T15:17:37.393

Link: CVE-2026-4689

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-24T12:30:23Z

Links: CVE-2026-4689 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T20:50:55Z

Weaknesses