CVE-2026-23839 PUBLISHED

Movary vulnerable to Cross-site Scripting with `?categoryUpdated=` param

Assigner: GitHub_M
Reserved: 16.01.2026 Published: 19.01.2026 Updated: 20.01.2026

Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is ?categoryUpdated=. Version 0.70.0 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
CVSS Score: 9.3

Product Status

Vendor leepeuker
Product movary
Versions
  • Version < 0.70.0 is affected

References

Problem Types

  • CWE-20: Improper Input Validation CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE