Invalid pointer in the JavaScript: WebAssembly component
Summary
| CVE | CVE-2026-6757 |
|---|---|
| State | PUBLISHED |
| Assigner | mozilla |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-21 13:16:21 UTC |
| Updated | 2026-04-22 17:39:26 UTC |
| Description | Invalid pointer in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10. |
Risk And Classification
Primary CVSS: v3.1 6.3 MEDIUM from ADP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
EPSS: 0.000180000 probability, percentile 0.047450000 (date 2026-04-22)
Problem Types: CWE-824 | CWE-824 CWE-824 Access of Uninitialized Pointer
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | ADP | DECLARED | 6.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 6.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
UnchangedConfidentiality
LowIntegrity
LowAvailability
LowCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Mozilla | Firefox | unaffected 140.10 140.* rpm | Not specified |
| CNA | Mozilla | Firefox | unaffected 150 * rpm | Not specified |
| CNA | Mozilla | Thunderbird | unaffected 140.10 140.* rpm | Not specified |
| CNA | Mozilla | Thunderbird | unaffected 150 * rpm | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| bugzilla.mozilla.org/show_bug.cgi | [email protected] | bugzilla.mozilla.org | Permissions Required |
| www.mozilla.org/security/advisories/mfsa2026-34 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-30 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-32 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-33 | [email protected] | www.mozilla.org | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Evyatar Ben Asher, Keane Lucas, Nicholas Carlini, Newton Cheng, Daniel Freeman, Alex Gaynor, and Joel Weinberger using Claude from Anthropic (en)
There are currently no legacy QID mappings associated with this CVE.