CVE-2026-23837: CWE-863: Incorrect Authorization in franklioxygen MyTube
CVE-2026-23837 is a critical authorization bypass vulnerability in franklioxygen MyTube versions prior to 1. 7. 66. It allows unauthenticated attackers to bypass role-based authentication middleware by omitting authentication cookies, resulting in unauthorized access to protected API endpoints. Attackers can modify application settings, change administrative and visitor passwords, and access sensitive routes without any authentication or user interaction. The vulnerability is patched in version 1. 7. 66, and immediate upgrade is strongly recommended. Mitigations include restricting access to /api/ endpoints via firewall or reverse proxy and manually patching the middleware logic to deny unauthenticated requests. The CVSS score is 9.
AI Analysis
Technical Summary
CVE-2026-23837 is an incorrect authorization vulnerability (CWE-863) affecting franklioxygen's MyTube, a self-hosted downloader and player for multiple video websites. The flaw exists in the roleBasedAuthMiddleware component of MyTube versions before 1.7.66, where the middleware fails to properly verify user authentication. Specifically, if an attacker sends a request without an authentication cookie, the req.user object is undefined, but the middleware erroneously calls next() instead of blocking the request. This logic flaw allows unauthenticated users to bypass mandatory authentication checks and gain unauthorized access to protected API endpoints such as /api/settings. Through these endpoints, attackers can alter application settings, reset administrative and visitor passwords, and access other sensitive routes that rely on this middleware for access control. The vulnerability affects all instances running MyTube with loginEnabled set to true. The issue was patched in version 1.7.66 by modifying the middleware to explicitly return a 401 Unauthorized error when req.user is undefined. Until users upgrade, mitigations include restricting network access to API endpoints using firewalls or reverse proxies like Nginx, or manually patching the middleware source code to enforce proper authentication checks. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity due to its network attack vector, lack of required privileges or user interaction, and full impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the flaw’s simplicity and severity make it a high-risk target for attackers.
Potential Impact
For European organizations, this vulnerability poses a critical risk to the confidentiality, integrity, and availability of MyTube instances. Unauthorized access to administrative settings can lead to complete takeover of the application, allowing attackers to manipulate content, disrupt services, or pivot to other internal systems. Organizations in media production, education, and digital content distribution that rely on MyTube for video management are particularly vulnerable. The ability to change passwords and settings without authentication can result in data breaches, service outages, and reputational damage. Given the critical CVSS score and ease of exploitation, unpatched MyTube deployments in Europe could be quickly compromised, especially in environments with internet-facing instances or insufficient network segmentation. The impact extends to compliance risks under GDPR if personal data is exposed or altered. The lack of user interaction and authentication requirements means attackers can automate exploitation at scale, increasing the threat to European entities.
Mitigation Recommendations
1. Immediate upgrade of all MyTube instances to version 1.7.66 or later is the most effective mitigation. 2. Until upgrade is possible, restrict access to /api/ endpoints using network-level controls such as firewalls or reverse proxies (e.g., Nginx) to allow only trusted IP addresses. 3. For organizations with development resources, manually patch the roleBasedAuthMiddleware by modifying the logic to return a 401 Unauthorized error when req.user is undefined instead of calling next(). 4. Conduct thorough audits of MyTube configurations to ensure loginEnabled is set to true and verify no instances are running vulnerable versions. 5. Monitor logs for unusual access patterns to /api/settings or other protected routes that could indicate exploitation attempts. 6. Implement network segmentation to isolate MyTube servers from critical infrastructure. 7. Educate administrators on the importance of timely patching and secure configuration management. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API requests targeting MyTube endpoints.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2026-23837: CWE-863: Incorrect Authorization in franklioxygen MyTube
Description
CVE-2026-23837 is a critical authorization bypass vulnerability in franklioxygen MyTube versions prior to 1. 7. 66. It allows unauthenticated attackers to bypass role-based authentication middleware by omitting authentication cookies, resulting in unauthorized access to protected API endpoints. Attackers can modify application settings, change administrative and visitor passwords, and access sensitive routes without any authentication or user interaction. The vulnerability is patched in version 1. 7. 66, and immediate upgrade is strongly recommended. Mitigations include restricting access to /api/ endpoints via firewall or reverse proxy and manually patching the middleware logic to deny unauthenticated requests. The CVSS score is 9.
AI-Powered Analysis
Technical Analysis
CVE-2026-23837 is an incorrect authorization vulnerability (CWE-863) affecting franklioxygen's MyTube, a self-hosted downloader and player for multiple video websites. The flaw exists in the roleBasedAuthMiddleware component of MyTube versions before 1.7.66, where the middleware fails to properly verify user authentication. Specifically, if an attacker sends a request without an authentication cookie, the req.user object is undefined, but the middleware erroneously calls next() instead of blocking the request. This logic flaw allows unauthenticated users to bypass mandatory authentication checks and gain unauthorized access to protected API endpoints such as /api/settings. Through these endpoints, attackers can alter application settings, reset administrative and visitor passwords, and access other sensitive routes that rely on this middleware for access control. The vulnerability affects all instances running MyTube with loginEnabled set to true. The issue was patched in version 1.7.66 by modifying the middleware to explicitly return a 401 Unauthorized error when req.user is undefined. Until users upgrade, mitigations include restricting network access to API endpoints using firewalls or reverse proxies like Nginx, or manually patching the middleware source code to enforce proper authentication checks. The vulnerability has a CVSS 3.1 base score of 9.8, indicating critical severity due to its network attack vector, lack of required privileges or user interaction, and full impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the flaw’s simplicity and severity make it a high-risk target for attackers.
Potential Impact
For European organizations, this vulnerability poses a critical risk to the confidentiality, integrity, and availability of MyTube instances. Unauthorized access to administrative settings can lead to complete takeover of the application, allowing attackers to manipulate content, disrupt services, or pivot to other internal systems. Organizations in media production, education, and digital content distribution that rely on MyTube for video management are particularly vulnerable. The ability to change passwords and settings without authentication can result in data breaches, service outages, and reputational damage. Given the critical CVSS score and ease of exploitation, unpatched MyTube deployments in Europe could be quickly compromised, especially in environments with internet-facing instances or insufficient network segmentation. The impact extends to compliance risks under GDPR if personal data is exposed or altered. The lack of user interaction and authentication requirements means attackers can automate exploitation at scale, increasing the threat to European entities.
Mitigation Recommendations
1. Immediate upgrade of all MyTube instances to version 1.7.66 or later is the most effective mitigation. 2. Until upgrade is possible, restrict access to /api/ endpoints using network-level controls such as firewalls or reverse proxies (e.g., Nginx) to allow only trusted IP addresses. 3. For organizations with development resources, manually patch the roleBasedAuthMiddleware by modifying the logic to return a 401 Unauthorized error when req.user is undefined instead of calling next(). 4. Conduct thorough audits of MyTube configurations to ensure loginEnabled is set to true and verify no instances are running vulnerable versions. 5. Monitor logs for unusual access patterns to /api/settings or other protected routes that could indicate exploitation attempts. 6. Implement network segmentation to isolate MyTube servers from critical infrastructure. 7. Educate administrators on the importance of timely patching and secure configuration management. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API requests targeting MyTube endpoints.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T15:46:40.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696e92284623b1157ccc1f38
Added to database: 1/19/2026, 8:20:56 PM
Last enriched: 1/19/2026, 8:35:17 PM
Last updated: 1/19/2026, 9:59:15 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1177: SQL Injection in Yonyou KSOA
MediumCVE-2026-23944: CWE-306: Missing Authentication for Critical Function in getarcaneapp arcane
HighCVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
MediumCVE-2026-23880: CWE-20: Improper Input Validation in HackUCF OnboardLite
HighCVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.