Impact
The vulnerability is a use‑after‑free bug in the Graphics: Canvas2D component that allows the sandbox protecting web content to be bypassed. By causing the browser to free a canvas object out of sequence, a malicious page can trigger arbitrary code execution outside the sandbox, potentially compromising the host system. The weakness is classified as CWE‑416 and CWE‑825.
Affected Systems
Mozilla Firefox and Mozilla Thunderbird are affected versions prior to 149. The issue was patched in Firefox 149 and Thunderbird 149, so any installation older than those releases must be updated.
Risk and Exploitability
The CVSS score of 9.3 marks it as critical, though the EPSS score is below 1%, indicating a low predicted exploitation probability at this time. It is not listed in the CISA KEV catalog. Attackers would need to lure a user to a malicious web page that uses Canvas2D; the vulnerability would be exercised when the page’s script causes a use‑after‑free condition. Because of the high impact and the fact that a patch exists, the risk is significant until the remedy is applied.
OpenCVE Enrichment