CVE-2026-24139: CWE-862: Missing Authorization in franklioxygen MyTube
MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below do not safeguard against authorization bypass, allowing guest users to download the complete application database. The application fails to properly validate user permissions on the database export endpoint, enabling low-privileged users to access sensitive data they should not have permission to view.
AI Analysis
Technical Summary
CVE-2026-24139 is a vulnerability classified under CWE-862 (Missing Authorization) affecting franklioxygen's MyTube application versions 1.7.78 and below. MyTube is a self-hosted video downloader and player supporting multiple video websites. The vulnerability stems from improper authorization checks on the database export endpoint, which allows guest or low-privileged users to bypass access controls and download the entire application database. This database likely contains sensitive user data, configuration details, and potentially cached video content metadata. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the vulnerability is remotely exploitable over the network with low attack complexity, no authentication required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as unauthorized access to the database can lead to data leakage, manipulation, or denial of service. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers seeking to extract sensitive data from exposed MyTube instances. The flaw highlights a critical failure in enforcing authorization policies on sensitive endpoints within the application. Organizations using MyTube should consider this vulnerability a serious risk to their data security and privacy.
Potential Impact
For European organizations, the impact of CVE-2026-24139 can be substantial. Unauthorized access to the MyTube database could expose sensitive user information, internal configuration, and possibly intellectual property related to video content management. This could lead to data breaches violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Additionally, attackers could manipulate or delete database contents, disrupting service availability and integrity of video playback or download functions. Organizations relying on MyTube for internal or public-facing media services may experience operational disruptions and loss of user trust. The vulnerability's network-exploitable nature means attackers can target exposed MyTube instances remotely, increasing the risk of widespread exploitation. Given the high CVSS score and the criticality of data involved, European entities must treat this vulnerability as a priority to avoid significant confidentiality and operational impacts.
Mitigation Recommendations
To mitigate CVE-2026-24139, organizations should immediately upgrade MyTube to version 1.7.79 or later once the patch is released, as this will address the missing authorization checks. Until the patch is available, restrict network access to the database export endpoint using firewalls or network segmentation to limit exposure to trusted users only. Implement strict access control policies and monitor logs for any unusual or unauthorized database export attempts. Conduct a thorough review of user permissions within MyTube to ensure that guest or low-privileged accounts cannot access sensitive endpoints. Employ application-layer firewalls or reverse proxies to add an additional authorization layer if possible. Regularly audit and update security configurations and educate administrators about the risks of exposing sensitive endpoints. Finally, maintain an incident response plan to quickly address any suspected exploitation or data leakage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2026-24139: CWE-862: Missing Authorization in franklioxygen MyTube
Description
MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below do not safeguard against authorization bypass, allowing guest users to download the complete application database. The application fails to properly validate user permissions on the database export endpoint, enabling low-privileged users to access sensitive data they should not have permission to view.
AI-Powered Analysis
Technical Analysis
CVE-2026-24139 is a vulnerability classified under CWE-862 (Missing Authorization) affecting franklioxygen's MyTube application versions 1.7.78 and below. MyTube is a self-hosted video downloader and player supporting multiple video websites. The vulnerability stems from improper authorization checks on the database export endpoint, which allows guest or low-privileged users to bypass access controls and download the entire application database. This database likely contains sensitive user data, configuration details, and potentially cached video content metadata. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the vulnerability is remotely exploitable over the network with low attack complexity, no authentication required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as unauthorized access to the database can lead to data leakage, manipulation, or denial of service. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers seeking to extract sensitive data from exposed MyTube instances. The flaw highlights a critical failure in enforcing authorization policies on sensitive endpoints within the application. Organizations using MyTube should consider this vulnerability a serious risk to their data security and privacy.
Potential Impact
For European organizations, the impact of CVE-2026-24139 can be substantial. Unauthorized access to the MyTube database could expose sensitive user information, internal configuration, and possibly intellectual property related to video content management. This could lead to data breaches violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Additionally, attackers could manipulate or delete database contents, disrupting service availability and integrity of video playback or download functions. Organizations relying on MyTube for internal or public-facing media services may experience operational disruptions and loss of user trust. The vulnerability's network-exploitable nature means attackers can target exposed MyTube instances remotely, increasing the risk of widespread exploitation. Given the high CVSS score and the criticality of data involved, European entities must treat this vulnerability as a priority to avoid significant confidentiality and operational impacts.
Mitigation Recommendations
To mitigate CVE-2026-24139, organizations should immediately upgrade MyTube to version 1.7.79 or later once the patch is released, as this will address the missing authorization checks. Until the patch is available, restrict network access to the database export endpoint using firewalls or network segmentation to limit exposure to trusted users only. Implement strict access control policies and monitor logs for any unusual or unauthorized database export attempts. Conduct a thorough review of user permissions within MyTube to ensure that guest or low-privileged accounts cannot access sensitive endpoints. Employ application-layer firewalls or reverse proxies to add an additional authorization layer if possible. Regularly audit and update security configurations and educate administrators about the risks of exposing sensitive endpoints. Finally, maintain an incident response plan to quickly address any suspected exploitation or data leakage.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-21T18:38:22.475Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69740ce44623b1157c6b18a7
Added to database: 1/24/2026, 12:05:56 AM
Last enriched: 1/31/2026, 8:52:34 AM
Last updated: 2/7/2026, 7:19:13 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.