[CIVN-2026-0166] Multiple Vulnerabilities in Mozilla Products

By Published On: April 2, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Mozilla Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Mozilla Firefox versions prior to 149

Mozilla Firefox ESR versions prior to 115.34

Mozilla Firefox ESR versions prior to 140.9

Mozilla Thunderbird versions prior to 140.9

Mozilla Thunderbird versions prior to 149

Overview


Multiple vulnerabilities have been reported in Mozilla products which could be exploited by a remote attacker to execute arbitrary code, perform spoofing attack, bypass security restriction or cause Denial of service (DoS) condition on the targeted system.


Target Audience:

All end-user organizations and individuals using Mozilla Products.


Risk Assessment:

High risk of unauthorized access to sensitive information.


Impact Assessment:

Potential for data theft, sensitive information disclosure and complete compromise of system.


Description


Mozilla Firefox is a free and open-source web browser developed by Mozilla foundation, while Firefox ESR (Extended support Release) is a stable version tailored for organizations that re-quire long-term support with only security and maintenance updates.


Multiple vulnerabilities exist in Mozilla products due to Use-after-free in the Graphics: WebRender com-ponent, Disability Access APIs component, CSS Parsing and Computation component, Layout: Text and Fonts component, JavaScript Engine component, Widget: Cocoa Component; Incorrect boundary conditions in the Graphics: Canvas2D component, Audio/Video: Playback component, Graphics component, Audio/Video: Web Codecs component, Layout: Text and Fonts component; Integer overflow in the XPCOM component, Graphics Component; JIT miscompilation in the JavaScript Engine: JIT component; Mitigation bypass in the Networking: HTTP component and Memory safety bugs. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.


Successful exploitation of these vulnerabilities which could be exploited by a remote attacker to execute arbitrary code, perform spoofing attack, bypass security restriction or cause Denial of service (DoS) condition on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/


https://www.mozilla.org/en-US/security/advisories/mfsa2026-21/


https://www.mozilla.org/en-US/security/advisories/mfsa2026-22/


https://www.mozilla.org/en-US/security/advisories/mfsa2026-23/


https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/



References


Mozilla

https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/

https://www.mozilla.org/en-US/security/advisories/mfsa2026-21/

https://www.mozilla.org/en-US/security/advisories/mfsa2026-22/

https://www.mozilla.org/en-US/security/advisories/mfsa2026-23/

https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/


CVE Name

CVE-2025-59375

CVE-2026-3889

CVE-2026-4371

CVE-2026-4684

CVE-2026-4685

CVE-2026-4686

CVE-2026-4687

CVE-2026-4688

CVE-2026-4689

CVE-2026-4690

CVE-2026-4691

CVE-2026-4692

CVE-2026-4693

CVE-2026-4694

CVE-2026-4695

CVE-2026-4696

CVE-2026-4697

CVE-2026-4698

CVE-2026-4699

CVE-2026-4700

CVE-2026-4701

CVE-2026-4702

CVE-2026-4704

CVE-2026-4705

CVE-2026-4706

CVE-2026-4707

CVE-2026-4708

CVE-2026-4709

CVE-2026-4710

CVE-2026-4711

CVE-2026-4712

CVE-2026-4713

CVE-2026-4714

CVE-2026-4715

CVE-2026-4716

CVE-2026-4717

CVE-2026-4718

CVE-2026-4719

CVE-2026-4720

CVE-2026-4721

CVE-2026-4722

CVE-2026-4723

CVE-2026-4724

CVE-2026-4725

CVE-2026-4726

CVE-2026-4727

CVE-2026-4728

CVE-2026-4729




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnOhSgACgkQ3jCgcSdc

ys8slw//WsBzWlyOI285xds6B49hrTcQa+zVzEBYn/zjcy7RDNqToCl2X36fgjN4

gNZeGxGacviIMOO63m8SybaYGpgB4KtYV5C2iJasbM2Ya1k9aeki88oYPrTiuFjK

pAoPghE3Bf012Aj739Y1pmUoLBLaN/DmYdBtpyQDutfqIExNbUzDkMu/LJ53G7Rf

ROoOKca25MrhDod+bWclID1yztDUr530HnEpfhGePy76hbummJ1tvH5Pnn4uIwzS

0EE8+hIvH4LFGsX8mr4GNPrkH4a2ZCm5guX1Dd1Y2geyHaWfaTLO1l631cSxySMu

dH8MLhyd5a+6i5DBA2/4F+f5+w+1ALxkQt3bTH6ZIqQnpx0BqwxsgS/yIoE2lmYA

5FcLbPXpOymBaatH4FHppE9EgRSnHLvxVM9UpEKW1oWVcPb71zn1b6BMHM0TuEfT

VT6mrZbRyBPiUDwHqD4c7JMSrO+2QEfEV1xcY9G2YKluaaW5+lQCddTBSm54WgDQ

W4L3bCIm9f/lFr8ztyhe2tu55irvUsmnx8kDKYBIM5xVeYb6HCys5iDeuN14i3LC

inz4E4rs5mh0mKxXDmRphjOlsJiRNfGQauFTG6HnFSukO4H9LI5OpmDSY8AmT/TE

ML0O64FalvWw5mpJDT+alCugaTCdWkA/w1jm+DaUx/YBlbdIc58=

=DWKr

—–END PGP SIGNATURE—–

Share this article