Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryCreated=`. Version 0.70.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/leepeuker/movary/releases/tag/0.70.0 | Release Notes |
| https://github.com/leepeuker/movary/security/advisories/GHSA-v877-x568-4v5v | Exploit Mitigation Vendor Advisory |
Configurations
History
02 Feb 2026, 15:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Leepeuker
Leepeuker movary |
|
| CPE | cpe:2.3:a:leepeuker:movary:*:*:*:*:*:*:*:* | |
| References | () https://github.com/leepeuker/movary/releases/tag/0.70.0 - Release Notes | |
| References | () https://github.com/leepeuker/movary/security/advisories/GHSA-v877-x568-4v5v - Exploit, Mitigation, Vendor Advisory |
19 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-19 19:16
Updated : 2026-02-02 15:17
NVD link : CVE-2026-23841
Mitre link : CVE-2026-23841
CVE.ORG link : CVE-2026-23841
JSON object : View
Products Affected
leepeuker
- movary
