CVE-2026-23840
Unknown Unknown - Not Provided
Cross-Site Scripting in Movary `categoryDeleted` Parameter

Publication date: 2026-01-19

Last updated on: 2026-02-03

Assigner: GitHub, Inc.

Description
Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryDeleted=`. Version 0.70.0 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-19
Last Modified
2026-02-03
Generated
2026-05-07
AI Q&A
2026-01-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
leepeuker movary to 0.70.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-20 The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-23840 is a critical reflected Cross-Site Scripting (XSS) vulnerability in the movary web application versions prior to 0.70.0. It occurs due to insufficient input validation of the `?categoryDeleted=` URL parameter, where user input is directly included in the server response without proper sanitization or encoding. This allows attackers to inject malicious JavaScript payloads that execute in the victim's browser when the page loads. [1]


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary JavaScript in the context of a victim's browser. Potential impacts include stealing session cookies, performing unauthorized actions on behalf of the user, and displaying deceptive content. The CVSS score is 9.3 (Critical), indicating high confidentiality and integrity impacts, with no availability impact. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by testing the `?categoryDeleted=` URL parameter for reflected cross-site scripting (XSS). For example, you can use curl or a browser to send requests with XSS payloads such as `<img src=1 onerror=alert(document.domain)>` or `<img src=1 onerror=alert(document.cookie)>` appended to the `categoryDeleted` parameter and observe if the payload executes in the browser. A sample curl command would be: `curl 'http://your-movary-instance/settings-account-location?categoryDeleted=<img src=1 onerror=alert(document.domain)>'`. If the alert triggers, the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation is to upgrade movary to version 0.70.0 or later, which includes a fix for this vulnerability. If upgrading is not immediately possible, ensure that the `categoryDeleted` parameter input is properly sanitized or purified before being included in the web page output, following OWASP XSS prevention guidelines to prevent injection of malicious scripts. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows attackers to execute arbitrary JavaScript in the context of a victim's browser, potentially stealing session cookies and performing unauthorized actions. This can lead to unauthorized access to personal data, which may result in non-compliance with data protection regulations such as GDPR and HIPAA that require safeguarding user data against unauthorized access and ensuring data integrity and confidentiality. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart