CVE-2026-5735
Memory Corruption in Firefox 149.0.1 Enables Code Execution
Publication date: 2026-04-07
Last updated on: 2026-04-13
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox | to 149.0.2 (exc) |
| mozilla | thunderbird | to 149.0.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker to run arbitrary code on your system through Firefox or Thunderbird. This means the attacker could potentially take control of your computer, access sensitive information, install malware, or perform other malicious actions.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update Firefox and Thunderbird to version 149.0.2 or later, as the issue affects versions prior to 149.0.2.
Can you explain this vulnerability to me?
This vulnerability involves memory safety bugs found in Firefox version 149.0.1 and Thunderbird version 149.0.1. Some of these bugs showed signs of memory corruption, which means that the software could behave unpredictably or incorrectly due to improper handling of memory.
It is presumed that with sufficient effort, some of these memory corruption bugs could be exploited by an attacker to execute arbitrary code on the affected system.
The vulnerability affects Firefox versions earlier than 149.0.2.