0.70.1
CVE-2026-23839 describes a critical Cross-Site Scripting (XSS) vulnerability affecting Movary, a web application designed for tracking and rating movies. This flaw allows attackers to inject malicious scripts into the application, potentially leading to account takeover and data theft. The vulnerability impacts versions of Movary prior to 0.70.0, and a patch has been released in version 0.70.0.
The XSS vulnerability in Movary arises from insufficient input validation when processing the ?categoryUpdated= parameter. An attacker can craft a malicious URL containing a JavaScript payload and entice a user to click on it. Upon clicking, the injected script executes within the user's browser context, allowing the attacker to steal cookies, session tokens, or redirect the user to a phishing site. This could result in unauthorized access to the user's Movary account and potentially other systems if the user reuses credentials. The impact is particularly severe as Movary handles sensitive user data, including movie preferences and ratings.
This vulnerability was publicly disclosed on 2026-01-19. No public proof-of-concept (PoC) code has been released at the time of writing, but the ease of exploitation makes it a likely target for opportunistic attackers. The CVSS score of 9.3 (CRITICAL) reflects the high severity and potential impact of this vulnerability. It is not currently listed on CISA KEV.
Users of Movary versions prior to 0.70.0 are at risk, particularly those who rely on the application to manage sensitive movie data or who share their Movary accounts. Shared hosting environments where multiple users share the same Movary instance are also at increased risk, as a compromise of one user's account could potentially expose others.
disclosure
漏洞利用状态
EPSS
0.13% (32% 百分位)
CISA SSVC
CVSS 向量
The primary mitigation for CVE-2026-23839 is to immediately upgrade Movary to version 0.70.0 or later, which includes the necessary input validation fixes. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to block requests containing suspicious characters or patterns in the ?categoryUpdated= parameter. Additionally, carefully review any custom code or plugins integrated with Movary to ensure they do not introduce similar vulnerabilities. Regularly scan the application for XSS vulnerabilities using automated tools.
将 Movary 更新到 0.70.0 或更高版本。此版本包含跨站脚本漏洞的修复。可以通过从官方网站下载最新版本或使用应用程序内置的更新机制来执行更新。
漏洞分析和关键警报直接发送到您的邮箱。
CVE-2026-23839 is a critical XSS vulnerability in Movary versions before 0.70.0, allowing attackers to inject malicious scripts via the ?categoryUpdated= parameter.
Yes, if you are using Movary version 0.70.0 or earlier, you are vulnerable to this XSS attack. Upgrade immediately.
Upgrade Movary to version 0.70.0 or later to patch the vulnerability. Consider a WAF as a temporary mitigation if upgrading is not immediately possible.
While no active exploitation has been confirmed, the ease of exploitation makes it a likely target, and proactive mitigation is recommended.
Refer to the Movary project's official website or GitHub repository for the latest security advisories and release notes.