Latest Progress MOVEit Automation vulnerabilities: CVE-2026-4670 and CVE-2026-5174 #

Progress Software has disclosed that certain versions of MOVEit Automation are susceptible to two vulnerabilities within the service backend command port interfaces.

  • CVE-2026-4670: An authentication bypass vulnerability that allows a remote, unauthenticated attacker to gain unauthorized access to the system. This vulnerability has been designated CVE-2026-4670 and has been rated critical with a CVSS score of 9.8.
  • CVE-2026-5174: An improper input validation vulnerability that allows a remote, low-privileged attacker to elevate their privileges. This vulnerability has been designated CVE-2026-5174 and has been rated high with a CVSS score of 7.7.

The following versions are affected:

  • MOVEit Automation: Version 2024.1.7 (16.1.7) and prior
  • MOVEit Automation: Version 2025.0.8 (17.0.8) and prior
  • MOVEit Automation: Version 2025.1.4 (17.1.4) and prior (Affected by CVE-2026-5174 only)

What is Progress MOVEit Automation? #

Progress MOVEit Automation is a managed file transfer (MFT) orchestration tool used to automate the scheduled or event-driven movement and processing of data between disparate servers, cloud storage environments, and applications via a centralized management interface.

What is the impact? #

Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access, obtain administrative control, or expose sensitive data.

Are updates or workarounds available? #

Users are encouraged to update to the latest version as quickly as possible:

  • MOVEit Automation 2024.x.x and prior: Upgrade to 2024.1.8 or later.
  • MOVEit Automation 2025.0.x: Upgrade to 2025.0.9 or later.
  • MOVEit Automation 2025.1.x: Upgrade to 2025.1.5 or later.

How to find potentially vulnerable systems with runZero #

From the Service inventory, use the following query to locate potentially impacted assets:

_asset.protocol:http AND protocol:http AND (html.title:="MOVEit Automation%" OR last.html.title:="MOVEit Automation%")

Written by Matthew Kienow

Matthew Kienow is a software engineer and security researcher. Matthew previously worked on the Recog recognition framework, AttackerKB as well as Metasploit's MSF 5 APIs. He has also designed, built, and successfully deployed many secure software solutions; however, often he enjoys breaking them instead. He has presented his research at various security conferences including DerbyCon, Hack In Paris, and CarolinaCon. His research has been cited by CSO, Threatpost and SC Magazine.

More about Matthew Kienow
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.

See Results in Minutes

See & secure your total attack surface. Even the unknowns & unmanageable.