CVE-2026-2795Use After Free in Mozilla Firefox

CWE-416Use After Free9 documents8 sources
Severity
9.8CRITICALNVD
EPSS
0.0%
top 85.98%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 24

Description

Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148 and Thunderbird 148.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDmozilla/firefox< 148.0
NVDmozilla/thunderbird< 148.0

🔴Vulnerability Details

3
OSV
CVE-2026-2795: Use-after-free in the JavaScript: GC component2026-02-24
GHSA
GHSA-8g7m-g6r7-rqcp: Use-after-free in the JavaScript: GC component2026-02-24
CVEList
Use-after-free in the JavaScript: GC component2026-02-24

📋Vendor Advisories

4
Red Hat
firefox: Use-after-free in the JavaScript: GC component2026-02-24
Debian
CVE-2026-2795: firefox - Use-after-free in the JavaScript: GC component. This vulnerability affects Firef...2026
Mozilla
Mozilla Foundation Security Advisory 2026-13: CVE-2026-2795
Mozilla
Mozilla Foundation Security Advisory 2026-16: CVE-2026-2795

🕵️Threat Intelligence

1
Wiz
CVE-2026-2795 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-2795 — Use After Free in Mozilla Firefox | cvebase