High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2026-40349
HighVulnerability Description
Movary is a self hosted web app to track and rate a user's watched movies. Prior to version 0.71.1, an ordinary authenticated user can escalate their own account to administrator by sending `isAdmin=true` to `PUT /settings/users/{userId}` for their own user ID. The endpoint is intended to let a user edit their own profile, but it updates the sensitive `isAdmin` field without any admin-only authorization check. Version 0.71.1 patches the issue.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
References & Resources
-
https://github.com/leepeuker/movary/commit/12c8a090051b1a1c07a3aa48922f3bc9ffe44c8bsecurity-advisories@github.com
-
https://github.com/leepeuker/movary/pull/750security-advisories@github.com
-
https://github.com/leepeuker/movary/releases/tag/0.71.1security-advisories@github.com
-
https://github.com/leepeuker/movary/security/advisories/GHSA-mcfq-8rx7-w25vsecurity-advisories@github.com
Severity Details
Weakness Type (CWE)
Missing Authorization
- Description
- The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
- Exploit Likelihood
- High
- Typical Severity
- High
- OWASP Top 10
- A01:2021-Broken Access Control
- Abstraction Level
- Class
Key Information
- Published Date
- April 18, 2026
