Description
A non-administrative user can upload malicious files. When an administrator or the product accesses that file, an arbitrary script may be executed on the administrator's browser. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well.
Published: 2026-02-04
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side script execution in administrator browsers
Action: Patch
AI Analysis

Impact

A non‑administrative user can upload any file type, and when an administrator views that file through Movable Type, the browser executes arbitrary script. This enables client‑side code execution that can steal credentials, deface content, or serve as a foothold for further attacks. The weakness is an unrestricted upload of dangerous file types (CWE‑434).

Affected Systems

The flaw affects all editions of Movable Type supplied by Six Apart, including the Cloud Edition, Software Edition, Advanced, and Premium releases. All affected releases are in the 7 series and 8.4 series, which are already end‑of‑life. No specific patch version list is provided, but the vulnerability exists across those series.

Risk and Exploitability

The vulnerability carries a CVSS score of 5.1, indicating a moderate impact if successfully exploited. The EPSS score is below 1 %, suggesting very low but nonzero likelihood of exploitation in the wild. The issue is not listed in CISA’s KEV catalog. An attacker needs only a non‑administrator account to upload a malicious file; execution requires that an administrator later accesses the file, which is a predictable action in normal usage. Exploitation does not require elevated privileges on the server, but the impact arises when the administrator’s browser runs the injected script.

Generated by OpenCVE AI on April 18, 2026 at 14:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest available Movable Type patch that addresses the unrestricted upload issue.
  • Configure the system to restrict file uploads to administrators only and enforce strict MIME‑type validation, allowing only safe formats such as images or PDFs.
  • Remove any previously uploaded files that may contain malicious content from the public upload directories and disable direct access to these directories from the web.

Generated by OpenCVE AI on April 18, 2026 at 14:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Unrestricted File Upload Enables Client‑Side Script Execution in Movable Type

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Six Apart
Six Apart movable Type
Six Apart Ltd
Six Apart Ltd movable Type
Vendors & Products Six Apart
Six Apart movable Type
Six Apart Ltd
Six Apart Ltd movable Type

Wed, 04 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 07:15:00 +0000

Type Values Removed Values Added
Description A non-administrative user can upload malicious files. When an administrator or the product accesses that file, an arbitrary script may be executed on the administrator's browser. Note that Movable Type 7 series and 8.4 series, which are End-of-Life (EOL), are affected by the vulnerability as well.
Weaknesses CWE-434
References
Metrics cvssV3_0

{'score': 6.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L'}


Subscriptions

Six Apart Movable Type
Six Apart Ltd Movable Type
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2026-02-04T16:07:28.812Z

Reserved: 2026-01-29T02:02:31.425Z

Link: CVE-2026-23704

cve-icon Vulnrichment

Updated: 2026-02-04T16:07:24.684Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T07:16:01.387

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23704

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:15:04Z

Weaknesses