Mozilla released Firefox 150 on April 21, 2026, patching 41 security vulnerabilities, including 9 rated High severity, spanning critical browser components such as DOM, WebRTC, JavaScript Engine, Web Codecs, and Graphics.
The sweeping update, covered under Mozilla Foundation Security Advisory (MFSA) 2026-30, also extends fixes to Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 140.10, and Thunderbird 150, making it one of the most significant browser security releases of 2026.
Security professionals and everyday users alike must treat this update as urgent: several of the patched flaws involve use-after-free and uninitialized memory vulnerabilities that could allow attackers to execute arbitrary code on vulnerable systems simply by luring a victim to a malicious webpage.
| Severity | CVE Count | Key Attack Vectors |
|---|---|---|
| High | 9 | Use-after-free, uninitialized memory, memory corruption, privilege escalation |
| Moderate | 20+ | Mitigation bypass, spoofing, info disclosure, privilege escalation |
| Low | 8 | DoS, invalid pointer, boundary conditions, info disclosure |
The comprehensive breakdown of all Common Vulnerabilities and Exposures (CVEs) addressed in Firefox 150 is detailed below.
| CVE ID | Component | Vulnerability Type | Severity |
|---|---|---|---|
| CVE-2026-6746 | DOM: Core & HTML | Use-after-free | High |
| CVE-2026-6747 | WebRTC | Use-after-free | High |
| CVE-2026-6748 | Audio/Video: Web Codecs | Uninitialized memory | High |
| CVE-2026-6749 | Graphics: Canvas2D | Information disclosure (uninitialized memory) | High |
| CVE-2026-6750 | Graphics: WebRender | Privilege escalation | High |
| CVE-2026-6751 | Audio/Video: Web Codecs | Uninitialized memory | High |
| CVE-2026-6752 | WebRTC | Incorrect boundary conditions | High |
| CVE-2026-6753 | WebRTC | Incorrect boundary conditions | High |
| CVE-2026-6754 | JavaScript Engine | Use-after-free | High |
| CVE-2026-6755 | DOM: postMessage | Mitigation bypass | Moderate |
| CVE-2026-6756 | Firefox for Android | Mitigation bypass | Moderate |
| CVE-2026-6757 | JavaScript: WebAssembly | Invalid pointer | Moderate |
| CVE-2026-6758 | JavaScript: WebAssembly | Use-after-free | Moderate |
| CVE-2026-6759 | Widget: Cocoa | Use-after-free | Moderate |
| CVE-2026-6760 | Networking: Cookies | Mitigation bypass | Moderate |
| CVE-2026-6761 | Networking | Privilege escalation | Moderate |
| CVE-2026-6762 | DOM: Core & HTML | Spoofing issue | Moderate |
| CVE-2026-6763 | File Handling | Mitigation bypass | Moderate |
| CVE-2026-6764 | DOM: Device Interfaces | Incorrect boundary conditions | Moderate |
| CVE-2026-6765 | Form Autofill | Information disclosure | Moderate |
| CVE-2026-6766 | Libraries (NSS) | Incorrect boundary conditions | Moderate |
| CVE-2026-6767 | Libraries (NSS) | Other issue | Moderate |
| CVE-2026-6768 | Networking: Cookies | Mitigation bypass | Moderate |
| CVE-2026-6769 | Debugger | Privilege escalation | Moderate |
| CVE-2026-6770 | Storage: IndexedDB | Other issue | Moderate |
| CVE-2026-6771 | DOM: Security | Mitigation bypass | Moderate |
| CVE-2026-6772 | Libraries (NSS) | Incorrect boundary conditions | Moderate |
| CVE-2026-6773 | Graphics: WebGPU | DoS — integer overflow | Low |
| CVE-2026-6774 | DOM: Security | Mitigation bypass | Low |
| CVE-2026-6775 | WebRTC | Incorrect boundary conditions | Low |
| CVE-2026-6776 | WebRTC: Networking | Incorrect boundary conditions | Low |
| CVE-2026-6777 | Networking: DNS | Other issue | Low |
| CVE-2026-6778 | Audio/Video: Playback | Invalid pointer | Low |
| CVE-2026-6779 | JavaScript Engine | Other issue | Low |
| CVE-2026-6780 | Audio/Video: Playback | Denial-of-service | Low |
| CVE-2026-6781 | Audio/Video: Playback | Denial-of-service | Low |
| CVE-2026-6782 | IP Protection | Information disclosure | Low |
| CVE-2026-6783 | Audio/Video: Playback | Incorrect boundary conditions / integer overflow | Low |
| CVE-2026-6784 | Memory Safety (Firefox 150 + TB 150) | Memory corruption / arbitrary code exec risk | High |
| CVE-2026-6785 | Memory Safety (Firefox ESR 115.35 / ESR 140.10 / FF 150) | Memory corruption / arbitrary code exec risk | High |
| CVE-2026-6786 | Memory Safety (Firefox ESR 140.10 / FF 150) | Memory corruption / arbitrary code exec risk | High |
All users running Firefox versions before 150, Firefox ESR before 115.35 or 140.10, Thunderbird before 140.10 or 150, and Firefox for Android are vulnerable.
To update Firefox, navigate to Menu → Help → About Firefox, and the browser will auto-detect and apply the update. Enterprise administrators managing large deployments should prioritize this patch within their standard update cycles, particularly given the potential for privilege escalation and arbitrary code execution posed by the high-severity CVEs.
Notably, Thunderbird users should be aware that while most of these flaws cannot be triggered directly via email (since scripting is disabled when reading mail), they remain exploitable in browser-like rendering contexts such as embedded HTML or calendar attachments.
FAQ
Q1: Is Firefox 150 actively exploited in the wild?
Mozilla has not confirmed active exploitation, but the severity and exploit potential of the use-after-free CVEs make rapid patching critical before threat actors develop working exploits.
Q2: Does this affect Firefox for Android users?
Yes, CVE-2026-6756 specifically targets Firefox for Android as a mitigation bypass flaw rated moderate severity, requiring Android users to update via the Google Play Store.
Q3: Are Firefox ESR users protected if they update to ESR 140.10 or ESR 115.35?
Yes, both ESR branches received the applicable subset of patches from this advisory, including the critical memory safety bugs covered under CVE-2026-6785 and CVE-2026-6786.
Q4: Did AI tools play a role in finding these vulnerabilities?
Yes, CVE-2026-6746, CVE-2026-6757, and CVE-2026-6758 were all discovered by a research team that used Anthropic’s Claude AI model as part of their security research methodology, marking a notable milestone in AI-assisted vulnerability discovery.
The 9 high-severity CVEs pose a risk of arbitrary code execution or privilege escalation, making Firefox 150 the most security-critical Firefox release in recent history. All users should immediately update to Firefox 150, Firefox ESR 115.35, or Firefox ESR 140.10 to mitigate exposure.
Site: https://thecybrdef.com