CVE-2026-23839: CWE-20: Improper Input Validation in leepeuker movary
Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryUpdated=`. Version 0.70.0 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-23839 identifies a critical security vulnerability in the leepeuker Movary web application, specifically versions prior to 0.70.0. Movary is designed to help users track, rate, and explore their movie watch history. The vulnerability stems from improper input validation (CWE-20) of the `?categoryUpdated=` URL parameter, which allows attackers to inject malicious JavaScript code, resulting in a cross-site scripting (XSS) attack (CWE-79). This flaw enables an attacker to craft a URL containing a malicious payload that, when visited by a user, executes arbitrary scripts within the context of the victim’s browser session. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as clicking a malicious link. The CVSS v3.1 score of 9.3 reflects a critical severity due to the network attack vector (AV:N), low attack complexity (AC:L), and the potential for complete confidentiality and integrity compromise (C:H/I:H), although availability is not impacted (A:N). The vulnerability affects all Movary versions before 0.70.0, and while no public exploits have been observed, the risk remains high due to the ease of exploitation and potential impact. The issue was publicly disclosed on January 19, 2026, and fixed in version 0.70.0. No official patch links were provided in the source data, but upgrading to the fixed version is the primary remediation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites, posing significant risks to user data and application integrity.
Potential Impact
For European organizations using Movary, this vulnerability could lead to significant data breaches involving user credentials, session hijacking, and unauthorized actions performed on behalf of users. Confidentiality is severely impacted as attackers can steal sensitive information stored or accessible via the application. Integrity is also compromised since attackers can manipulate the user interface or data presented to users. Although availability is unaffected, the trustworthiness of the application is undermined, potentially damaging organizational reputation. Organizations in sectors such as media, entertainment, and technology that rely on Movary for user engagement or data analytics are particularly at risk. The exploitation requires user interaction, which may limit automated mass exploitation but still poses a high risk through phishing or social engineering campaigns. The lack of known exploits in the wild suggests a window of opportunity for defenders to patch systems before widespread attacks occur. Failure to address this vulnerability could result in regulatory penalties under GDPR if personal data is compromised.
Mitigation Recommendations
1. Immediately upgrade all Movary instances to version 0.70.0 or later, where the vulnerability is fixed. 2. Implement strict input validation and output encoding on all user-supplied data, especially URL parameters like `categoryUpdated`, to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Conduct regular security audits and penetration testing focusing on input validation and XSS vectors within the application. 5. Educate users and administrators about phishing risks and the dangers of clicking untrusted links that may exploit this vulnerability. 6. Monitor web server and application logs for unusual requests containing suspicious payloads targeting the vulnerable parameter. 7. If upgrading immediately is not feasible, consider implementing web application firewall (WAF) rules to detect and block malicious input patterns targeting the `categoryUpdated` parameter. 8. Review session management practices to ensure that session tokens are protected via HttpOnly and Secure flags to mitigate session hijacking risks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-23839: CWE-20: Improper Input Validation in leepeuker movary
Description
Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryUpdated=`. Version 0.70.0 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-23839 identifies a critical security vulnerability in the leepeuker Movary web application, specifically versions prior to 0.70.0. Movary is designed to help users track, rate, and explore their movie watch history. The vulnerability stems from improper input validation (CWE-20) of the `?categoryUpdated=` URL parameter, which allows attackers to inject malicious JavaScript code, resulting in a cross-site scripting (XSS) attack (CWE-79). This flaw enables an attacker to craft a URL containing a malicious payload that, when visited by a user, executes arbitrary scripts within the context of the victim’s browser session. The vulnerability does not require authentication (PR:N) but does require user interaction (UI:R), such as clicking a malicious link. The CVSS v3.1 score of 9.3 reflects a critical severity due to the network attack vector (AV:N), low attack complexity (AC:L), and the potential for complete confidentiality and integrity compromise (C:H/I:H), although availability is not impacted (A:N). The vulnerability affects all Movary versions before 0.70.0, and while no public exploits have been observed, the risk remains high due to the ease of exploitation and potential impact. The issue was publicly disclosed on January 19, 2026, and fixed in version 0.70.0. No official patch links were provided in the source data, but upgrading to the fixed version is the primary remediation. The vulnerability could be leveraged to steal session cookies, perform actions on behalf of users, or redirect users to malicious sites, posing significant risks to user data and application integrity.
Potential Impact
For European organizations using Movary, this vulnerability could lead to significant data breaches involving user credentials, session hijacking, and unauthorized actions performed on behalf of users. Confidentiality is severely impacted as attackers can steal sensitive information stored or accessible via the application. Integrity is also compromised since attackers can manipulate the user interface or data presented to users. Although availability is unaffected, the trustworthiness of the application is undermined, potentially damaging organizational reputation. Organizations in sectors such as media, entertainment, and technology that rely on Movary for user engagement or data analytics are particularly at risk. The exploitation requires user interaction, which may limit automated mass exploitation but still poses a high risk through phishing or social engineering campaigns. The lack of known exploits in the wild suggests a window of opportunity for defenders to patch systems before widespread attacks occur. Failure to address this vulnerability could result in regulatory penalties under GDPR if personal data is compromised.
Mitigation Recommendations
1. Immediately upgrade all Movary instances to version 0.70.0 or later, where the vulnerability is fixed. 2. Implement strict input validation and output encoding on all user-supplied data, especially URL parameters like `categoryUpdated`, to prevent injection of malicious scripts. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 4. Conduct regular security audits and penetration testing focusing on input validation and XSS vectors within the application. 5. Educate users and administrators about phishing risks and the dangers of clicking untrusted links that may exploit this vulnerability. 6. Monitor web server and application logs for unusual requests containing suspicious payloads targeting the vulnerable parameter. 7. If upgrading immediately is not feasible, consider implementing web application firewall (WAF) rules to detect and block malicious input patterns targeting the `categoryUpdated` parameter. 8. Review session management practices to ensure that session tokens are protected via HttpOnly and Secure flags to mitigate session hijacking risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T15:46:40.842Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696e7ae9d302b072d9d1c2d0
Added to database: 1/19/2026, 6:41:45 PM
Last enriched: 1/26/2026, 7:46:09 PM
Last updated: 2/5/2026, 9:54:21 PM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1964: Improper Access Controls in WeKan
MediumCVE-2026-25815: CWE-1394 Use of Default Cryptographic Key in Fortinet FortiOS
LowCVE-2026-1963: Improper Access Controls in WeKan
MediumCVE-2025-15551: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in TP-Link Systems Inc. Archer MR200 v5.2
MediumCVE-2026-1962: Improper Access Controls in WeKan
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.