Description
Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Published: 2026-03-24
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution
Action: Immediate Patch
AI Analysis

Impact

Use‑after‑free in the CSS parsing and computation component can allow an attacker to trigger a fault that may lead to arbitrary code execution or a crash. The vulnerability stems from improper memory handling during CSS parsing, which falls under CWE‑416 and CWE‑825. Successful exploitation could compromise confidentiality, integrity, and availability of the affected user, potentially permitting full system compromise if the code is executed in a privileged context.

Affected Systems

Mozilla products are affected, including Firefox and Thunderbird. All versions prior to the fixes are vulnerable. The issue was addressed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9. Users running older builds should verify their version and update accordingly.

Risk and Exploitability

With a CVSS base score of 9.8 and an EPSS below 1%, the vulnerability is considered critical, though exploitation is predicted to be rare at present. It is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no widespread active exploits. However, the likely attack vector is through crafted web content or mail messages containing malicious CSS, meaning any user who visits a compromised site or opens a malicious email could be impacted. Admins should therefore treat this as a high‑priority patching issue.

Generated by OpenCVE AI on April 13, 2026 at 15:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Mozilla Firefox to the latest stable release (v149 or newer).
  • Upgrade Mozilla Firefox ESR to the latest ESR release (v115.34 or newer).
  • Upgrade Mozilla Thunderbird to the latest stable release (v149 or newer).
  • Upgrade Thunderbird ESR to the latest ESR release (v140.9 or newer).
  • Keep all Mozilla products current and monitor the Mozilla Security Advisories page for future updates.

Generated by OpenCVE AI on April 13, 2026 at 15:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4510-1 firefox-esr security update
Debian DLA Debian DLA DLA-4511-1 thunderbird security update
Debian DSA Debian DSA DSA-6178-1 firefox-esr security update
Debian DSA Debian DSA DSA-6179-1 thunderbird security update
History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Description Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9. Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.

Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla firefox Esr
Vendors & Products Mozilla firefox Esr

Tue, 24 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Description Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9. Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, Firefox ESR < 140.9, Thunderbird < 149, and Thunderbird < 140.9.
References

Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Weaknesses CWE-416
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
Vendors & Products Mozilla
Mozilla firefox
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 24 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description Use-after-free in the CSS Parsing and Computation component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9.
Title Use-after-free in the CSS Parsing and Computation component
References

Subscriptions

Mozilla Firefox Firefox Esr
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-05-07T14:50:45.605Z

Reserved: 2026-03-23T23:21:44.154Z

Link: CVE-2026-4691

cve-icon Vulnrichment

Updated: 2026-03-26T12:49:26.344Z

cve-icon NVD

Status : Modified

Published: 2026-03-24T13:16:04.937

Modified: 2026-04-13T15:17:37.860

Link: CVE-2026-4691

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-24T12:30:24Z

Links: CVE-2026-4691 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:43:39Z

Weaknesses