CVE-2026-2791
Published: 24 February 2026
Summary
CVE-2026-2791 is a critical-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Mozilla Firefox. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 8.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates timely remediation of critical flaws like CVE-2026-2791 through vendor patches to Firefox 148 and Thunderbird 140.8, preventing exploitation of the cache mitigation bypass.
Requires vulnerability scanning to identify systems running vulnerable Firefox or Thunderbird versions affected by CVE-2026-2791, enabling proactive patching.
Ensures monitoring and application of security advisories such as MFSA2026-13 to promptly update browsers and mitigate the cache component bypass in CVE-2026-2791.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Mitigation bypass in browser cache component (CWE-288) with no-auth remote trigger and full CIA impact directly enables client-side exploitation (T1203) while impairing defenses by subverting security controls (T1562.001).
NVD Description
Mitigation bypass in the Networking: Cache component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
Deeper analysisAI
CVE-2026-2791 is a mitigation bypass vulnerability in the Networking: Cache component of Mozilla Firefox and Thunderbird. The issue, published on 2026-02-24, affects versions prior to Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8, where it was fixed. It is associated with CWE-288 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity.
Remote attackers require no privileges or user interaction to exploit this vulnerability over the network with low attack complexity. Successful exploitation enables high-impact disruption to confidentiality, integrity, and availability, allowing attackers to bypass security mitigations via the cache component.
Mozilla's security advisories (MFSA2026-13, MFSA2026-15, MFSA2026-16, and MFSA2026-17), along with Bugzilla entry 2015220, document the vulnerability and confirm that updating to the specified fixed versions—Firefox 148, Firefox ESR 140.8, Thunderbird 148, or Thunderbird 140.8—mitigates the issue.
Details
- CWE(s)