CVE-2026-40350
Description
Movary is a self hosted web app to track and rate a user's watched movies. Prior to version 0.71.1, an ordinary authenticated user can access the user-management endpoints /settings/users and use them to enumerate all users and create a new administrator account. This happens because the route definitions do not enforce admin-only middleware, and the controller-level authorization check uses a broken boolean condition. As a result, any user with a valid web session cookie can reach functionality that should be restricted to administrators. Version 0.71.1 patches the issue.
Affected products
1Patches
192c7400486f5Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/leepeuker/movary/commit/92c7400486f5fe9f350046e04e45a8502778bf39nvdPatch
- github.com/leepeuker/movary/pull/749nvdIssue TrackingPatch
- github.com/leepeuker/movary/security/advisories/GHSA-7r3f-9fwv-p43wnvdExploitVendor Advisory
- github.com/leepeuker/movary/releases/tag/0.71.1nvdRelease Notes
News mentions
0No linked articles in our index yet.