CVE-2026-2783
Received Received - Intake
Information Disclosure via JIT Miscompilation in Firefox JavaScript Engine

Publication date: 2026-02-24

Last updated on: 2026-04-13

Assigner: Mozilla Corporation

Description
Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-24
Last Modified
2026-04-13
Generated
2026-05-07
AI Q&A
2026-02-24
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
mozilla firefox to 148.0 (exc)
mozilla thunderbird to 148.0 (exc)
mozilla thunderbird to 140.8.0 (exc)
mozilla firefox to 140.8.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
CWE-843 The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an information disclosure issue caused by just-in-time (JIT) miscompilation in the JavaScript Engine's JIT component. It affects versions of Firefox earlier than 148 and Firefox ESR earlier than 140.8.


How can this vulnerability impact me? :

The vulnerability can lead to unintended disclosure of information due to errors in the JIT compilation process within the JavaScript engine. This could potentially expose sensitive data to attackers when using affected versions of Firefox.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart