Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable Arbitrary Code Execution


Mozilla released Firefox 147 on January 13, 2026, addressing 16 security vulnerabilities detailed in the Mozilla Foundation Security Advisory.

The update patches critical issues across components such as graphics, JavaScript, and networking, addressing six high-impact flaws, including multiple sandbox escapes, that could enable arbitrary code execution if exploited.

These fixes also apply to Firefox ESR 140.7 and Thunderbird ESR 140.7/147, urging users to update immediately amid rising browser-targeted attacks.

The release counters sophisticated threats uncovered through bug reports and fuzzing. High-severity vulnerabilities dominate, particularly sandbox escapes in graphics and messaging systems, reported largely by researcher Oskar L.

Memory safety bugs in CVE-2026-0891 and CVE-2026-0892 showed evidence of corruption and are likely exploitable with effort. No active exploitation has been confirmed, but the cluster of graphics flaws highlights ongoing risks in WebGL and Canvas rendering.

High-Impact Sandbox Escapes and Memory Corruption

Several vulnerabilities enable sandbox escapes, breaching Firefox’s isolation mechanisms. CVE-2026-0877 allows DOM mitigation bypass, while CVE-2026-0878 through CVE-2026-0880 exploit boundary conditions and integer overflows in Graphics and CanvasWebGL.

google

CVE-2026-0881 targets the Messaging System. A use-after-free in IPC (CVE-2026-0882) adds to the tally. These high-impact issues, fixed in version 147, could let attackers run code outside sandboxed contexts.

CVE IDDescription/ComponentImpactReporter(s)
CVE-2026-0877Mitigation bypass in the DOM: Security componentHighmingijung
CVE-2026-0878Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL componentHighOskar L
CVE-2026-0879Sandbox escape due to incorrect boundary conditions in the Graphics componentHighOskar L
CVE-2026-0880Sandbox escape due to integer overflow in the Graphics componentHighOskar L
CVE-2026-0881Sandbox escape in the Messaging System componentHighAndrew McCreight
CVE-2026-0882Use-after-free in the IPC componentHighRandell Jesup
CVE-2026-0883Information disclosure in the Networking componentModerateVladislav Plyatsok
CVE-2026-0884Use-after-free in the JavaScript Engine componentModerateGary Kwong and Nan Wang
CVE-2026-0885Use-after-free in the JavaScript: GC componentModerateIrvan Kurniawan
CVE-2026-0886Incorrect boundary conditions in the Graphics componentModerateOskar L
CVE-2026-0887Clickjacking issue, information disclosure in the PDF Viewer componentModerateLyra Rebane
CVE-2026-0888Information disclosure in the XML componentLowPier Angelo Vendrame
CVE-2026-0889Denial-of-service in the DOM: Service Workers componentLowElysee Franchuk, Caleb Lerch
CVE-2026-0890Spoofing issue in the DOM: Copy & Paste and Drag & Drop componentLowEdgar Chen
CVE-2026-0891Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147HighAndrew McCreight, Dennis Jackson and the Mozilla Fuzzing Team

Mozilla’s fuzzing team identified memory safety bugs fixed in CVE-2026-0891 (affecting ESR 140.6, Firefox 146, Thunderbird 146) and CVE-2026-0892 (Firefox/Thunderbird 146). Bugs like 1964722 and 2004443 exhibited corruption patterns ripe for exploitation.

Organizations should prioritize updates via Firefox’s auto-updater or admin consoles.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

googlenews



Source link