MOVEit automation flaws could enable full system compromise


MOVEit automation flaws could enable full system compromise

Pierluigi Paganini
May 04, 2026

Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access to systems.

Progress Software addressed two vulnerabilities in MOVEit Automation, a critical authentication bypass flaw tracked as CVE-2026-4670 and a privilege escalation issue tracked as CVE-2026-5174. If exploited, these bugs could allow attackers to gain unauthorized access or elevate privileges.

MOVEit Automation is an enterprise managed file transfer (MFT) solution developed by Progress Software. It’s designed to securely move, schedule, and automate file transfers between systems, applications, and partners, without needing custom scripts.

MOVEit Automation is widely used to manage and automate file transfers in enterprise environments.

“Critical and high vulnerabilities in MOVEit Automation may allow authentication bypass and privilege escalation through the service backend command port interfaces” reads the advisory. “Exploitation may lead to unauthorized access, administrative control, and data exposure.”

The vulnerabilities impact the following versions:

  • MOVEit Automation <= 2025.1.4
  • MOVEit Automation <= 2025.0.8
  • MOVEit Automation <= 2024.1.7

Airbus SecLab researchers Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau discovered and reported the vulnerabilities.

According to the advisory, no workarounds are available.

Flaws like this are especially dangerous because they can be weaponized quickly and at scale once discovered.

A vulnerability such as an authentication bypass or privilege escalation can let attackers gain access to many systems in a short time, especially when the affected software is widely used in enterprises. Once a working exploit exists, it often gets reused in large automated campaigns, not just targeted attacks.

This is what happened in past incidents involving ransomware groups like Clop ransomware group. They repeatedly abused vulnerabilities in file transfer systems (like MOVEit in 2023) to steal data from hundreds of organizations at once, before victims even had time to patch.

In August 2023, cybersecurity firm Emsisoft shared disconcerting details about a massive hacking campaign conducted by the Cl0p ransomware group that targeted the MOVEit Transfer file transfer platform designed by Progress Software Corporation.

According to the experts, the attacks impacted approximately 1,000 Organizations and 60,144,069 individuals. The Cl0p ransomware gang exploited the zero-day vulnerability CVE-2023-34362 to hack the platforms used by organizations worldwide and steal their data.

That’s why these bugs are high-risk: they don’t just affect one company, they can become the entry point for mass exploitation, data theft, and ransomware extortion campaigns worldwide.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, MOVEit Automation)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Remember those moments when a tech giant throws a curveball, only for the underdog to dodge it with style? That’s exactly what just went down with Anything. For those of you unaware, it’s an AI-powered app builder that lets users whip up mobile and web apps using simple text prompts.

Last week, Apple yanked the app from the App Store, citing its usual guideline around code execution and keeping apps “self-contained.” The move felt like part of a broader side-eye toward so-called “vibe coding” tools, where building software is starting to feel as casual as texting a friend.

Apple pulled the app… and Anything got creative

Instead of backing down, the Anything team went full chaos mode, and in a good way. They rebuilt the core experience inside iMessage, effectively turning a messaging app into an app-building tool. Yes, actual app creation… through texts.

BREAKING: Apple is scared of vibe coding

they removed Anything from the App Store so we moved app building to iMessage

good luck removing this one, Apple pic.twitter.com/QrZ2oRk6ha

— Anything (@anything) April 2, 2026

It didn’t just work, it blew up. The workaround went viral, people loved the ingenuity, and the narrative flipped almost instantly. What started as “Apple said no” quickly turned into “wait, this is actually genius.” Memes followed, timelines filled up, and suddenly it felt like Apple had been outplayed at its own game.

And now, just like that, it’s back

Just days later, Apple quietly brought Anything back to the App Store with a few tweaks, but the core idea remains the same: build apps using simple text prompts, preview them instantly, and ship them straight from a phone. The comeback also feels like a subtle shift in momentum. AI is making creation faster, easier, and way more accessible. And when developers can route around restrictions using something as basic as iMessage, it becomes harder to hold that line.

As AI makes creation effortless, even tightly controlled platforms are being forced to adapt. And if this saga proves anything, it’s that creativity will always find a way around the rules.



Source link