CVE-2026-8091
Incorrect Boundary Handling in Firefox ESR Playback Component
Publication date: 2026-05-07
Last updated on: 2026-05-07
Assigner: Mozilla Corporation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mozilla | firefox_esr | to 140.10.2 (inc) |
| mozilla | firefox_esr | to 115.35.2 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-8091 is a security vulnerability found in the Audio/Video: Playback component of Firefox ESR. It involves incorrect boundary conditions, which means that the software does not properly handle limits or edges in processing audio and video data.
This flaw could lead to memory corruption or other unintended behaviors during audio and video playback, potentially causing the browser to behave unpredictably or insecurely.
The vulnerability was discovered by the Mozilla Fuzzing Team and has been classified as having a high impact. It was fixed in Firefox ESR versions 140.10.2 and 115.35.2.
How can this vulnerability impact me? :
This vulnerability can impact users by potentially causing memory corruption or other unintended behaviors when playing audio or video content in Firefox ESR.
Such memory corruption could be exploited by attackers to execute arbitrary code, crash the browser, or cause other security issues, leading to compromised system security or loss of data integrity.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update your Firefox ESR browser to version 140.10.2 or later, or to version 115.35.2 or later.
These versions contain fixes for the incorrect boundary conditions in the Audio/Video: Playback component that cause this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
There is no information provided in the available resources or CVE description about how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.