CVE-2026-8390
Published: 12 May 2026
Summary
CVE-2026-8390 is a high-severity Use After Free (CWE-416) vulnerability in Mozilla (inferred from references). Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Drive-by Compromise (T1189); ranked at the 5.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Use-after-free exploits that achieve arbitrary code execution are blocked or significantly hardened by non-executable pages and ASLR.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Use-after-free in browser JS/WebAssembly engine directly enables RCE via malicious web content, facilitating drive-by compromise and client exploitation.
NVD Description
Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150.0.3.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)