Movary Privilege Escalation Vulnerability (CVE-2026-40349)
Movary versions prior to 0.71.1 allow authenticated users to escalate privileges to administrator by manipulating the `isAdmin` field via a PUT request to the `/settings/users/{userId}` endpoint, due to missing authorization checks.
Movary is a self-hosted web application designed for users to track and rate movies they have watched. Prior to version 0.71.1, the application contains a privilege escalation vulnerability (CVE-2026-40349). An authenticated user could modify their account to gain administrative privileges without proper authorization. This is achieved by sending a PUT request to the /settings/users/{userId} endpoint with the isAdmin field set to true. This vulnerability exists because the application fails to implement sufficient authorization checks before updating the sensitive isAdmin field. Version 0.71.1 addresses this issue, mitigating the risk of unauthorized privilege escalation. The vulnerable versions expose self-hosted Movary instances to potential compromise.
Attack Chain
- An attacker gains initial access to a Movary instance with a valid, non-administrative user account.
- The attacker identifies the vulnerable
/settings/users/{userId}endpoint that manages user profile settings. - The attacker crafts a PUT request to
/settings/users/{userId}, substituting{userId}with their own user ID. - The PUT request includes the parameter
isAdmin=truewithin the request body, attempting to modify the user’s privilege level. - The Movary server processes the PUT request without performing adequate authorization checks to verify the user’s authority to modify the
isAdminfield. - The server updates the user’s account, setting the
isAdminflag totrue, effectively granting the attacker administrative privileges. - The attacker logs out and back into the Movary instance.
- Upon re-authentication, the attacker now possesses administrative privileges and can access and modify sensitive data, configurations, and potentially compromise the entire Movary instance.
Impact
Successful exploitation of this vulnerability allows an attacker to gain full administrative control over a Movary instance. This could lead to unauthorized access to user data, modification or deletion of movies and ratings, and potentially complete compromise of the server hosting the application. The number of affected instances is unknown but depends on the number of deployments running vulnerable versions of Movary. The severity is high, as it allows a low-privilege user to gain complete control over the application.
Recommendation
- Upgrade Movary instances to version 0.71.1 or later to remediate the vulnerability (references: Overview section).
- Deploy the provided Sigma rule to detect suspicious PUT requests to
/settings/users/{userId}attempting to modify theisAdminparameter (references: Sigma rule below). - Implement input validation and authorization checks on the server-side to prevent unauthorized modification of sensitive user attributes (references: CVE-2026-40349 description).
Detection coverage 2
Detect Movary Admin Privilege Escalation Attempt
highDetects attempts to escalate privileges in Movary by sending a PUT request to the /settings/users endpoint with isAdmin=true.
Detect Movary User Settings Modification
mediumDetects PUT requests to the Movary /settings/users endpoint, which could indicate suspicious user profile modifications.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
| Type | Value |
|---|---|
| [email protected] |