Cyber Posture

CVE-2026-2775

Critical

Published: 24 February 2026

Published
24 February 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 8.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2775 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Mozilla Firefox. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 8.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Drive-by Compromise (T1189) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates timely identification, reporting, and patching of flaws like CVE-2026-2775 in Firefox and Thunderbird HTML parser to prevent exploitation.

detect

Requires vulnerability scanning to identify systems running vulnerable versions of Firefox or Thunderbird affected by CVE-2026-2775.

prevent

Ensures dissemination of security advisories such as Mozilla MFSA 2026-13 to prompt patching of CVE-2026-2775.

MITRE ATT&CK Enterprise TechniquesAI

T1189 Drive-by Compromise Initial Access
Adversaries may gain access to a system through a user visiting a website over the normal course of browsing.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

CVE describes remote client-side HTML/DOM parser mitigation bypass in browser/email client leading directly to arbitrary code execution (no UI required); maps to drive-by compromise (T1189) as initial access vector and exploitation for client execution (T1203).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Mitigation bypass in the DOM: HTML Parser component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.

Deeper analysisAI

CVE-2026-2775 is a mitigation bypass vulnerability in the DOM HTML Parser component of Mozilla Firefox and Thunderbird. It affects versions of Firefox prior to 148, Firefox ESR prior to 115.33 and 140.8, and Thunderbird prior to 148 and 140.8. The issue is classified under CWE-288 with a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high impact across confidentiality, integrity, and availability.

The vulnerability enables exploitation by any remote, unauthenticated attacker with network access and low attack complexity, requiring no user interaction or privileges. Successful exploitation allows the attacker to bypass security mitigations in the HTML parser, potentially leading to arbitrary code execution, data theft, or system compromise within the affected browser or email client context.

Mozilla's security advisories (MFSA 2026-13 through 2026-16) and the associated Bugzilla entry (bug 2015199) confirm the vulnerability was addressed in the listed fixed releases. Security practitioners should prioritize updating to Firefox 148 or later, Firefox ESR 115.33/140.8 or later, and Thunderbird 148/140.8 or later to mitigate the issue.

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 115.33.0 · ≤ 148.0 · 128.0 — 140.8.0
mozilla
thunderbird
≤ 140.8.0 · ≤ 148.0

CVEs Like This One

CVE-2026-6771Same product: Mozilla Firefox
CVE-2026-2784Same product: Mozilla Firefox
CVE-2026-6760Same product: Mozilla Firefox
CVE-2026-2791Same product: Mozilla Firefox
CVE-2025-0241Same product: Mozilla Firefox
CVE-2026-2795Same product: Mozilla Firefox
CVE-2025-1010Same product: Mozilla Firefox
CVE-2026-4700Same product: Mozilla Firefox
CVE-2026-2766Same product: Mozilla Firefox
CVE-2026-4724Same product: Mozilla Firefox

References