CVE-2026-23841
Published: 19 January 2026
Description
Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryCreated=`. Version 0.70.0 fixes the issue.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of untrusted inputs like the categoryCreated URL parameter to block XSS payloads from being processed.
Mandates filtering or encoding of outputs to prevent reflected XSS payloads from executing in the victim's browser.
Requires timely remediation of identified flaws, such as patching to version 0.70.0 which fixes the input validation issue.
Security SummaryAI
CVE-2026-23841 is a cross-site scripting (XSS) vulnerability stemming from insufficient input validation (CWE-20, CWE-79) in the Movary web application, which allows users to track, rate, and explore their movie watch history. The issue affects all versions of Movary prior to 0.70.0 and is triggered via the `?categoryCreated=` URL parameter. It has a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N), indicating high severity due to its network accessibility, low attack complexity, lack of required privileges, and potential for high confidentiality and integrity impacts with a changed scope.
Attackers can exploit this vulnerability remotely over the network without authentication by crafting malicious links containing XSS payloads in the `?categoryCreated=` parameter. Exploitation requires user interaction, such as a victim clicking the link or visiting a malicious site while authenticated to a vulnerable Movary instance. Successful exploitation allows attackers to execute arbitrary scripts in the context of the victim's browser, potentially stealing sensitive data like session cookies or watch history (C:H), modifying application state or content (I:H), with no direct availability impact.
The Movary project addresses this vulnerability in version 0.70.0, which includes fixes for the input validation flaw. Security practitioners should upgrade to this version immediately, as detailed in the project's release notes at https://github.com/leepeuker/movary/releases/tag/0.70.0 and the GitHub Security Advisory at https://github.com/leepeuker/movary/security/advisories/GHSA-v877-x568-4v5v. No workarounds are specified beyond patching.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS vulnerability in public-facing web app exploited via malicious links (spearphishing), enabling arbitrary JS execution to steal browser credentials and web session cookies.