
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-26381 is a high-impact use-after-free vulnerability discovered in Firefox's SVG text reflow functionality. The vulnerability was reported by Mozilla Fuzzing Team and Hossein Lotfi of Trend Micro Zero Day Initiative and was fixed in Firefox 98, Firefox ESR 91.7, and Thunderbird 91.7, released on March 8, 2022 (Mozilla Advisory).
The vulnerability is a use-after-free condition that occurs when forcing a text reflow in an SVG object. The issue specifically manifests in the SVGRenderingObserver::OnNonDOMMutationRenderingChange function. Debug builds revealed assertion failures in SVGRenderingObserver::DebugObserverSet(), indicating a failure to properly track observer sets. The vulnerability has a CVSS 3.1 base score of 8.8 (High), with attack vector being Network, attack complexity Low, and requiring user interaction (Ubuntu CVE).
The vulnerability could lead to a potentially exploitable crash when triggered, potentially allowing arbitrary code execution. The issue affects Firefox versions prior to 98, Firefox ESR versions before 91.7, and Thunderbird versions before 91.7 (Mozilla Advisory).
The vulnerability was patched in Firefox 98, Firefox ESR 91.7, and Thunderbird 91.7. Users should upgrade to these versions or newer to mitigate the risk. For Thunderbird specifically, the risk is minimized as scripting is disabled by default when reading mail, though the vulnerability could still be exploited in browser-like contexts (Mozilla Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."