Cyber Posture

CVE-2026-7323

High

Published: 28 April 2026

Published
28 April 2026
Modified
30 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 18.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7323 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Mozilla Firefox. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 18.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates timely identification, mitigation, and correction of software flaws like the memory safety bugs in Thunderbird to prevent arbitrary code execution.

detect

Requires regular vulnerability scanning to identify systems running vulnerable Thunderbird versions affected by CVE-2026-7323.

detect

Ensures receipt and dissemination of security advisories like Mozilla's MFSA notices for CVE-2026-7323 to enable prompt flaw remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Memory corruption vulnerability in Thunderbird email client enabling remote arbitrary code execution without user interaction directly maps to T1203 Exploitation for Client Execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Memory safety bugs present in Thunderbird ESR 140.10.0 and Thunderbird 150.0.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability…

more

was fixed in Firefox 150.0.1, Firefox ESR 140.10.1, Thunderbird 150.0.1, and Thunderbird 140.10.1.

Deeper analysisAI

CVE-2026-7323 involves multiple memory safety bugs (CWE-119 and CWE-787) present in Thunderbird ESR 140.10.0 and Thunderbird 150.0.0. These bugs demonstrated evidence of memory corruption, which Mozilla presumes could be exploited with sufficient effort to achieve arbitrary code execution. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network-accessible nature and low barriers to exploitation.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low attack complexity and without requiring user interaction or privileges. Successful exploitation could result in low-level impacts to confidentiality, integrity, and availability, though the memory corruption evidence suggests potential for more severe outcomes like code execution if chained or refined.

Mozilla addressed the issue in Firefox 150.0.1, Firefox ESR 140.10.1, Thunderbird 150.0.1, and Thunderbird ESR 140.10.1. Security practitioners should prioritize updating affected Thunderbird installations. Additional details are available in Mozilla's advisories (MFSA 2026-35, 36, 38, 39) and related Bugzilla entries (bugs 2028537, 2029911, 2031121, 2033602).

Details

CWE(s)

Affected Products

mozilla
firefox
≤ 140.10.1 · ≤ 150.0.1
mozilla
thunderbird
≤ 140.10.1 · ≤ 150.0.1

CVEs Like This One

CVE-2025-9185Same product: Mozilla Firefox
CVE-2025-9179Same product: Mozilla Firefox
CVE-2026-6753Same product: Mozilla Firefox
CVE-2026-4710Same product: Mozilla Firefox
CVE-2025-9184Same product: Mozilla Firefox
CVE-2026-0891Same product: Mozilla Firefox
CVE-2026-2792Same product: Mozilla Firefox
CVE-2026-5731Same product: Mozilla Firefox
CVE-2026-0892Same product: Mozilla Firefox
CVE-2026-7324Same product: Mozilla Firefox

References