Description
Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Thunderbird 150.
Published: 2026-04-21
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access
Action: Patch
AI Analysis

Impact

Based on the description, it is inferred that Mozilla’s Firefox implements a security component within the DOM that can be bypassed, allowing a crafted web page or script to perform privileged operations that should be protected, thereby exposing the user to unauthorized actions on data or application state. The flaw is classified as CWE‑693 and CWE‑358, indicating that security checks were improperly enforced or omitted in the execution path and that sensitive data may be inadvertently exposed.

Affected Systems

All releases of Firefox and Thunderbird older than version 150 are vulnerable, as the flaw was addressed in the 150 release cycle. Users of the affected products should review their current versions and plan an upgrade if they are running older builds.

Risk and Exploitability

The CVSS score of 5.4 places the issue in the moderate range, and the EPSS score is currently unavailable. The flaw is not listed in CISA’s KEV catalog, suggesting a lower publicly confirmed exploitation probability at present. Based on the description, it is inferred that the vulnerability manifests when a malicious site or local script leverages DOM manipulation to subvert the security component, allowing potential theft of sensitive information or escalation of user privileges. Unless mitigated, a determined attacker can exploit this path in combination with other weaknesses to increase the overall impact.

Generated by OpenCVE AI on April 22, 2026 at 15:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Firefox to version 150 or newer, which includes the security component fix.
  • Upgrade Thunderbird to version 150 or newer, which includes the security component fix.
  • Enable and enforce automatic updates to avoid remaining on older, vulnerable builds.
  • Limit exposure by reviewing or disabling third‑party extensions that interact directly with DOM APIs, reducing the attack surface for the bypass.

Generated by OpenCVE AI on April 22, 2026 at 15:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla thunderbird
CPEs cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*
Vendors & Products Mozilla thunderbird

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-358
References
Metrics threat_severity

None

threat_severity

Moderate


Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150. Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150 and Thunderbird 150.
References

Tue, 21 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Mozilla
Mozilla firefox
Vendors & Products Mozilla
Mozilla firefox

Tue, 21 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 150.
Title Mitigation bypass in the DOM: Security component
References

Subscriptions

Mozilla Firefox Thunderbird
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2026-04-21T23:35:09.351Z

Reserved: 2026-04-21T12:41:05.633Z

Link: CVE-2026-6774

cve-icon Vulnrichment

Updated: 2026-04-21T14:00:58.738Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T13:16:23.173

Modified: 2026-04-22T15:17:38.297

Link: CVE-2026-6774

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-21T12:41:05Z

Links: CVE-2026-6774 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T15:15:16Z

Weaknesses