CVE-2026-23839
Published: 19 January 2026
Description
Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryUpdated=`. Version 0.70.0 fixes the issue.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly addresses the root cause of insufficient input validation in the `?categoryUpdated=` parameter, preventing XSS payload injection.
SI-15 enforces output filtering to encode or sanitize reflected inputs, blocking XSS payload execution in the browser.
SI-2 ensures timely flaw remediation by patching to version 0.70.0 or later, eliminating the specific XSS vulnerability.
Security SummaryAI
CVE-2026-23839 is a cross-site scripting (XSS) vulnerability in Movary, a self-hosted web application for tracking, rating, and exploring movie watch history. The issue stems from insufficient input validation (CWE-20) in the `?categoryUpdated=` parameter, allowing attackers to inject and trigger arbitrary JavaScript payloads. It affects all versions of Movary prior to 0.70.0 and has a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, and potential for high confidentiality and integrity impacts in a scoped context (CWE-79).
Remote attackers without authentication can exploit this vulnerability by crafting malicious URLs or inputs that include XSS payloads in the `?categoryUpdated=` parameter. Exploitation requires user interaction, such as a victim clicking a specially crafted link or visiting a malicious page while logged into a vulnerable Movary instance. Successful attacks enable theft of sensitive user data, such as session cookies or personal watch history, session hijacking, or unauthorized modifications to the application's client-side state.
The Movary project addressed the vulnerability in version 0.70.0, which includes a fix for input validation. Security practitioners should upgrade to this version or later. Official advisories and code details are available in the GitHub security advisory (GHSA-v32w-5qx7-p3vq), the release notes for v0.70.0, and the affected JavaScript file at public/js/settings-account-location.js line 237.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS vulnerability in public-facing self-hosted web app enables exploitation of public-facing application (T1190) and facilitates theft of session cookies via arbitrary JS execution (T1539).