Critical MOVEit Automation vulnerabilities allow authentication bypass and privilege escalation


Progress Software has patched two serious MOVEit Automation vulnerabilities that can let attackers bypass authentication, escalate privileges, and potentially gain administrative control of affected systems.

The flaws are tracked as CVE-2026-4670 and CVE-2026-5174. The first is a critical authentication bypass issue with a CVSS score of 9.8, while the second is a high-severity privilege escalation flaw with a CVSS score of 7.7.

MOVEit Automation customers should upgrade to a fixed version immediately. The platform helps organizations automate secure file movement, so a compromise could expose sensitive workflows, stored credentials, business files, and connected systems.

What Progress fixed

Progress says the vulnerabilities affect the service backend command port interfaces in MOVEit Automation. Successful exploitation may lead to unauthorized access, administrative control, and data exposure.

The company credited Airbus SecLab researchers Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau with reporting the vulnerabilities.

The issue affects several supported MOVEit Automation branches. Older unsupported versions also remain at risk and should move to a supported release path.

At a glance

CVEIssueSeverityAttack requirementMain risk
CVE-2026-4670Authentication bypass by primary weaknessCritical, CVSS 9.8No privileges requiredUnauthorized access
CVE-2026-5174Improper input validationHigh, CVSS 7.7Low privileges requiredPrivilege escalation

Why these MOVEit Automation flaws matter

CVE-2026-4670 creates the highest risk because it can allow authentication bypass. An attacker does not need a valid account to exploit this flaw, according to the CVSS vector assigned by Progress.

CVE-2026-5174 requires low privileges, but it can raise the attacker’s level of access. When chained with the authentication bypass flaw, the two issues may create a path toward administrative control.

MOVEit Automation often handles scheduled transfers between internal systems, cloud services, partners, and other business platforms. That makes it a valuable target for attackers seeking data, credentials, and access to connected environments.

Affected MOVEit Automation versions

The affected versions include MOVEit Automation 2025.1.4 and earlier, 2025.0.8 and earlier, and 2024.1.7 and earlier.

NVD also lists affected ranges that include versions from 2025.1.0 before 2025.1.5, from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, and versions prior to 2024.0.0 for CVE-2026-5174.

Administrators can check the installed version from the Web Admin interface by opening Help and then About. Progress recommends using the full installer to move to a fixed release.

Patched versions

Installed branchVulnerable versionsFixed version
MOVEit Automation 2025.12025.1.4 and earlier2025.1.5 or later
MOVEit Automation 2025.02025.0.8 and earlier2025.0.9 or later
MOVEit Automation 2024.12024.1.7 and earlier2024.1.8 or later
Older versionsUnsupported or prior release linesUpgrade to a supported fixed release

How administrators should respond

Progress says upgrading to a patched release with the full installer is the only way to remediate the issue. The company also warns that the upgrade will cause a system outage while the installer runs.

Security teams should not treat this as a normal maintenance update. MOVEit products remain attractive targets because managed file transfer systems often sit near sensitive business data.

There is no public indication in the main vendor and security advisories that these two vulnerabilities have been exploited in the wild. Still, the risk level remains high because the authentication bypass flaw is remotely exploitable and does not require credentials.

  • Confirm the installed MOVEit Automation version from the Web Admin dashboard.
  • Upgrade to MOVEit Automation 2025.1.5, 2025.0.9, or 2024.1.8.
  • Use the full installer, not a partial workaround.
  • Plan for a short outage during the upgrade process.
  • Review audit logs for unexpected privilege escalation.
  • Check for unauthorized access or unusual backend activity.
  • Review stored credentials and rotate them if suspicious activity appears.
  • Move unsupported installations to a supported release line.

What security teams should monitor

Progress says unexpected privilege escalation, unauthorized access, or anomalous activity in audit logs may indicate possible exploitation of CVE-2026-4670.

Teams should also review administrative accounts, scheduled tasks, transfer workflows, credential stores, and new or modified automation jobs. Suspicious changes in these areas may point to abuse of the platform.

Organizations should also check whether MOVEit Automation can reach sensitive internal systems. If it can, incident response teams should widen their review beyond the application itself.

Why older MOVEit incidents raise concern

MOVEit Transfer was heavily targeted in 2023 after a separate zero-day vulnerability exposed many organizations to data theft. The newly patched issues affect MOVEit Automation, not the same MOVEit Transfer flaw from 2023.

Even so, that history explains why administrators now treat MOVEit security updates with urgency. Attackers have repeatedly shown interest in managed file transfer products because they can provide access to valuable business data.

The safest response is simple: patch first, then investigate. Any internet-exposed or business-critical MOVEit Automation server should move to the fixed version as soon as possible.

FAQ

Which versions fix the vulnerabilities?

The fixed versions are MOVEit Automation 2025.1.5, 2025.0.9, and 2024.1.8.

Which MOVEit Automation versions are affected?

Affected versions include MOVEit Automation 2025.1.4 and earlier, 2025.0.8 and earlier, 2024.1.7 and earlier, and older unsupported versions.

What is CVE-2026-5174?

CVE-2026-5174 is an improper input validation vulnerability in MOVEit Automation. It can allow attackers with low privileges to escalate access.

What is CVE-2026-4670?

CVE-2026-4670 is a critical authentication bypass vulnerability in Progress MOVEit Automation. It can allow unauthenticated attackers to bypass login protections.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages