CVE-2026-8971: Same-Origin Policy Bypass in Firefox JAR Component
CVE-2026-8971 Published on May 19, 2026

Same-origin policy bypass in the Networking: JAR component
Same-origin policy bypass in the Networking: JAR component. This vulnerability was fixed in Firefox 151.

NVD

Vulnerability Analysis

CVE-2026-8971 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

Origin Validation Error

The software does not properly verify that the source of data or communication is valid.


Products Associated with CVE-2026-8971

Want to know whenever a new CVE is published for Mozilla Firefox? stack.watch will email you.

 

Affected Versions

Mozilla Firefox: