CVE-2026-40349
Received Received - Intake
Privilege Escalation in Movary via Insecure User Settings Update

Publication date: 2026-04-18

Last updated on: 2026-04-27

Assigner: GitHub, Inc.

Description
Movary is a self hosted web app to track and rate a user's watched movies. Prior to version 0.71.1, an ordinary authenticated user can escalate their own account to administrator by sending `isAdmin=true` to `PUT /settings/users/{userId}` for their own user ID. The endpoint is intended to let a user edit their own profile, but it updates the sensitive `isAdmin` field without any admin-only authorization check. Version 0.71.1 patches the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-18
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
leepeuker movary to 0.71.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in Movary, a self-hosted web app for tracking and rating movies. Before version 0.71.1, an authenticated user could escalate their privileges to administrator by sending the parameter `isAdmin=true` to the endpoint `PUT /settings/users/{userId}` for their own user ID.

The endpoint is intended to allow users to edit their own profile, but it incorrectly updates the sensitive `isAdmin` field without verifying if the user has admin rights. This lack of an admin-only authorization check allows ordinary users to grant themselves administrator privileges.

This issue was fixed in version 0.71.1.


How can this vulnerability impact me? :

This vulnerability can have severe impacts because it allows an ordinary authenticated user to escalate their privileges to administrator.

  • An attacker could gain full administrative control over the Movary application.
  • With admin privileges, the attacker can modify other users' data, change application settings, and potentially access sensitive information.
  • This could lead to data breaches, unauthorized data manipulation, and disruption of service.
  • The vulnerability has a high CVSS score of 8.8, indicating a high severity with impacts on confidentiality, integrity, and availability.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP PUT requests to the endpoint /settings/users/{userId} where an authenticated user attempts to set the parameter isAdmin=true for their own user ID.

A possible way to detect exploitation attempts is to analyze web server logs or use network monitoring tools to look for PUT requests containing the isAdmin=true parameter.

For example, using command line tools, you could search your web server access logs for such requests with a command like:

  • grep 'PUT /settings/users/' /path/to/access.log | grep 'isAdmin=true'

Alternatively, if you have access to the database or application logs, you could query for changes to the isAdmin field made by non-administrator users.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Movary to version 0.71.1 or later, where this vulnerability has been patched.

Until the upgrade can be performed, restrict access to the PUT /settings/users/{userId} endpoint or implement additional authorization checks to prevent ordinary users from modifying the isAdmin field.

Additionally, monitor for suspicious activity such as unauthorized privilege escalations and review user accounts for unexpected administrator privileges.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows an ordinary authenticated user to escalate their privileges to administrator by modifying the isAdmin field without proper authorization checks.

Such unauthorized privilege escalation can lead to unauthorized access to sensitive data and administrative functions, potentially violating data protection and privacy requirements under standards like GDPR and HIPAA.

Specifically, unauthorized administrative access could result in exposure, modification, or deletion of personal or protected health information, thereby compromising confidentiality, integrity, and availability.

Therefore, this vulnerability negatively impacts compliance with common standards and regulations that mandate strict access controls and protection of sensitive data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart