Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryUpdated=`. Version 0.70.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/leepeuker/movary/blob/main/public/js/settings-account-location.js#L237 | Product |
| https://github.com/leepeuker/movary/releases/tag/0.70.0 | Release Notes |
| https://github.com/leepeuker/movary/security/advisories/GHSA-v32w-5qx7-p3vq | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2026-01-19 19:16
Updated : 2026-02-03 14:48
NVD link : CVE-2026-23839
Mitre link : CVE-2026-23839
CVE.ORG link : CVE-2026-23839
JSON object : View
Products Affected
leepeuker
- movary
