Technical Advisory

Through sharp, technical and insightful analysis, the Payatu Team is constantly on the lookout for vulnerabilities and threats. This section exhibits a few of our findings.

Technical Advisory

Through sharp, technical and insightful analysis, the Payatu Team is constantly on the lookout for vulnerabilities and threats. This section exhibits a few of our findings.

Mozilla Firefox Same-Origin Policy Bypass via JAR URI Handling

VULNERABILITY

A same-origin policy (SOP) bypass vulnerability was identified in the Networking: JAR component of Mozilla Firefox and Mozilla Thunderbird. The BLE stack and input processing components accept peripheral devices with insufficient verification. The affected versions fail to properly enforce origin restrictions when handling JAR (Java Archive) URI content, allowing malicious scripts loaded via the jar: URI scheme to access resources across different origins. This implementation flaw in origin validation allows cross-origin data access that should otherwise be strictly prohibited by the browser’s security model.

IMPACT

Successful exploitation allows a network-based attacker to bypass fundamental browser security boundaries without requiring any user interaction or elevated privileges. This can lead to unauthorized access to sensitive cross-origin data including authentication tokens, session cookies, and personal information from other origins. The combination of a network attack vector, low attack complexity, and no authentication requirement means this vulnerability could be exploited at scale against any user running a vulnerable version of Firefox or Thunderbird, potentially resulting in complete compromise of user sessions and sensitive data exfiltration.

CVE ID

CVE-2026-2790

Vulnerability Type

Authentication Bypass / Same-Origin Policy Bypass

CWE

CWE-346 – Origin Validation Error

Vendor

Mozilla

Affected Products

Firefox < 148, Firefox ESR < 140.8, Thunderbird < 148, Thunderbird ESR < 140.8

CVSS Score

9.8 (Critical)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Attack Vector

Network

Privileges Required

None

User Interaction

None

DISCLOSURE TIMELINE

24 Feb 2026 CVE-2026-2790 published to NVD

26 Feb 2026 Last updated in NVD database

27 Feb 2026 Advisory published

CREDITS

Surya Dev Singh– Payatu Security Consulting Pvt. Ltd.

DOWNLOAD THE DATASHEET

Fill in your details and get your copy of the datasheet in few seconds

DOWNLOAD THE EBOOK

Fill in your details and get your copy of the ebook in your inbox

Ebook Download

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download ICS Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Cloud Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download IoT Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Code Review Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Red Team Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download AI/ML Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download DevSecOps Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Product Security Assessment Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Mobile Sample Report

DOWNLOAD A SAMPLE REPORT

Fill in your details and get your copy of sample report in few seconds

Download Web App Sample Report

Let’s make cyberspace secure together!

Requirements

Connect Now Form

What our clients are saying!

Trusted by