Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24139: CWE-862: Missing Authorization in franklioxygen MyTube

0
High
VulnerabilityCVE-2026-24139cvecve-2026-24139cwe-862
Published: Fri Jan 23 2026 (01/23/2026, 23:55:23 UTC)
Source: CVE Database V5
Vendor/Project: franklioxygen
Product: MyTube

Description

MyTube is a self-hosted downloader and player for several video websites. Versions 1.7.78 and below do not safeguard against authorization bypass, allowing guest users to download the complete application database. The application fails to properly validate user permissions on the database export endpoint, enabling low-privileged users to access sensitive data they should not have permission to view.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:52:34 UTC

Technical Analysis

CVE-2026-24139 is a vulnerability classified under CWE-862 (Missing Authorization) affecting franklioxygen's MyTube application versions 1.7.78 and below. MyTube is a self-hosted video downloader and player supporting multiple video websites. The vulnerability stems from improper authorization checks on the database export endpoint, which allows guest or low-privileged users to bypass access controls and download the entire application database. This database likely contains sensitive user data, configuration details, and potentially cached video content metadata. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates that the vulnerability is remotely exploitable over the network with low attack complexity, no authentication required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, as unauthorized access to the database can lead to data leakage, manipulation, or denial of service. No public exploits have been reported yet, but the vulnerability's nature makes it a prime target for attackers seeking to extract sensitive data from exposed MyTube instances. The flaw highlights a critical failure in enforcing authorization policies on sensitive endpoints within the application. Organizations using MyTube should consider this vulnerability a serious risk to their data security and privacy.

Potential Impact

For European organizations, the impact of CVE-2026-24139 can be substantial. Unauthorized access to the MyTube database could expose sensitive user information, internal configuration, and possibly intellectual property related to video content management. This could lead to data breaches violating GDPR and other data protection regulations, resulting in legal penalties and reputational damage. Additionally, attackers could manipulate or delete database contents, disrupting service availability and integrity of video playback or download functions. Organizations relying on MyTube for internal or public-facing media services may experience operational disruptions and loss of user trust. The vulnerability's network-exploitable nature means attackers can target exposed MyTube instances remotely, increasing the risk of widespread exploitation. Given the high CVSS score and the criticality of data involved, European entities must treat this vulnerability as a priority to avoid significant confidentiality and operational impacts.

Mitigation Recommendations

To mitigate CVE-2026-24139, organizations should immediately upgrade MyTube to version 1.7.79 or later once the patch is released, as this will address the missing authorization checks. Until the patch is available, restrict network access to the database export endpoint using firewalls or network segmentation to limit exposure to trusted users only. Implement strict access control policies and monitor logs for any unusual or unauthorized database export attempts. Conduct a thorough review of user permissions within MyTube to ensure that guest or low-privileged accounts cannot access sensitive endpoints. Employ application-layer firewalls or reverse proxies to add an additional authorization layer if possible. Regularly audit and update security configurations and educate administrators about the risks of exposing sensitive endpoints. Finally, maintain an incident response plan to quickly address any suspected exploitation or data leakage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-21T18:38:22.475Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69740ce44623b1157c6b18a7

Added to database: 1/24/2026, 12:05:56 AM

Last enriched: 1/31/2026, 8:52:34 AM

Last updated: 2/7/2026, 7:19:13 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats