Description
Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryCreated=`. Version 0.70.0 fixes the issue.
Published: 2026-01-19
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site Scripting (client‑side execution)
Action: Patch Immediately
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:leepeuker:movary:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Leepeuker
Leepeuker movary
Vendors & Products Leepeuker
Leepeuker movary

Mon, 19 Jan 2026 19:00:00 +0000

Type Values Removed Values Added
Description Movary is a web application to track, rate and explore your movie watch history. Due to insufficient input validation, attackers can trigger cross-site scripting payloads in versions prior to 0.70.0. The vulnerable parameter is `?categoryCreated=`. Version 0.70.0 fixes the issue.
Title Movary vulnerable to Cross-site Scripting with `?categoryCreated=` param
Weaknesses CWE-20
CWE-79
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}


Subscriptions

Leepeuker Movary
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-20T20:05:55.115Z

Reserved: 2026-01-16T15:46:40.842Z

Link: CVE-2026-23841

cve-icon Vulnrichment

Updated: 2026-01-20T20:02:45.928Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T19:16:04.370

Modified: 2026-02-02T15:17:06.853

Link: CVE-2026-23841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:15:15Z

Weaknesses