Movary Admin Escalation: A Simple Patch, A Critical Flaw
The National Vulnerability Database has detailed CVE-2026-40349, a high-severity vulnerability affecting Movary, a self-hosted movie tracking web application. Prior to version 0.71.1, an authenticated user could escalate their privileges to administrator by manipulating a PUT request to their own user settings. Specifically, sending isAdmin=true to the /settings/users/{userId} endpoint for their own user ID would bypass authorization checks, granting administrative access.
This flaw, rated 8.8 CVSS (HIGH) and categorized as CWE-862 (Missing Authorization), highlights a common developer oversight: trusting client-side input for sensitive operations. The endpoint, intended for profile edits, failed to validate if the isAdmin field modification was authorized for a non-admin user. Version 0.71.1 addresses this critical issue.
For defenders, this is a textbook example of why granular access control and server-side validation are non-negotiable. An attacker’s calculus here is simple: find an authenticated endpoint that updates user attributes and see which sensitive fields can be tampered with. This often provides a quick path to full system compromise from a low-privilege foothold.
What This Means For You
- If your organization uses Movary, you need to patch to version 0.71.1 immediately. This isn't a theoretical flaw; it's a direct path for any authenticated user to become an administrator. Audit your Movary instances for unauthorized admin accounts if you were running an affected version.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Movary User Privilege Escalation via Settings Update - CVE-2026-40349
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-40349 | Privilege Escalation | Movary web app |
| CVE-2026-40349 | Privilege Escalation | Movary versions prior to 0.71.1 |
| CVE-2026-40349 | Privilege Escalation | PUT /settings/users/{userId} endpoint |
| CVE-2026-40349 | Privilege Escalation | Parameter 'isAdmin=true' in PUT /settings/users/{userId} |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 18, 2026 at 03:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.