JIT Miscompilation in JavaScript Component Affecting Mozilla Firefox
CVE-2026-2796

9.8CRITICAL

Key Information:

Vendor

Mozilla

Vendor
CVE Published:
24 February 2026

Badges

πŸ₯‡ Trended No. 1πŸ“ˆ TrendedπŸ“ˆ Score: 2,010

What is CVE-2026-2796?

CVE-2026-2796 is a vulnerability within the JavaScript component of Mozilla Firefox and Thunderbird, specifically related to Just-In-Time (JIT) miscompilation in the WebAssembly framework. Firefox and Thunderbird are widely used applications that serve as web browsers and email clients, respectively, providing users with powerful tools for internet navigation and communication. This vulnerability, which affects versions prior to 148, has the potential to undermine the security of affected systems by compromising the integrity of code execution. A successful exploitation could allow malicious actors to execute arbitrary code, potentially affecting user data and system stability within organizations that rely on these applications.

Potential impact of CVE-2026-2796

  1. Arbitrary Code Execution: Attackers could exploit this vulnerability to execute arbitrary code on affected systems, leading to unauthorized control and manipulation of system resources.

  2. Data Breaches: The ability to run harmful code may result in data extraction, exposing sensitive organizational information and putting personal user data at risk.

  3. Service Disruption: By leveraging this vulnerability, malicious actors could disrupt the normal functioning of Firefox and Thunderbird, impairing communication and productivity across affected organizations.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Firefox < 148

Thunderbird < 148

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ₯‡

    Vulnerability reached the number 1 worldwide trending spot

  • πŸ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

Credit

Information to follow
.