CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership May 05, 2026

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

The Hacker News Archived May 05, 2026 ✓ Full text saved

Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts. The

Full text archived locally
✦ AI Summary · Claude Sonnet


    Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass Ravie LakshmananMay 04, 2026Vulnerability / Enterprise Software Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-based managed file transfer (MFT) solution used to schedule and automate file movement workflows in enterprise environments without requiring any custom scripts.  The vulnerabilities in question are CVE-2026-4670 (CVSS score: 9.8), an authentication bypass vulnerability, and CVE-2026-5174 (CVSS score: 7.7), an improper input validation vulnerability that could allow privilege escalation. "Critical and high vulnerabilities in MOVEit Automation may allow authentication bypass and privilege escalation through the service backend command port interfaces," Progress Software said in an advisory. "Exploitation may lead to unauthorized access, administrative control, and data exposure." The shortcomings affect the following versions - MOVEit Automation <= 2025.1.4 (Fixed in MOVEit Automation 2025.1.5) MOVEit Automation <= 2025.0.8 (Fixed in MOVEit Automation 2025.0.9) MOVEit Automation <= 2024.1.7 (Fixed in MOVEit Automation 2024.1.8) Airbus SecLab researchers Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau have been credited with discovering and reporting the two vulnerabilities. There are no workarounds that resolve the issues. While Progress makes no mention of the flaws being exploited in the wild, it's essential that users apply the fixes as soon as possible for optimal protection, particularly given that prior flaws in MOVEit Transfer have been exploited by ransomware gangs like Cl0p. Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post. SHARE     Tweet Share Share SHARE  cybersecurity, data security, Enterprise Software, network security, Patch Management, privilege escalation, Threat Intelligence, Vulnerability ⚡ Top Stories This Week ⚡ Weekly Recap: Fast16 Malware, XChat Launch, Federal Backdoor, AI Employee Tracking and More Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain Vercel Finds More Compromised Accounts in Context.ai-Linked Breach Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202 FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches Microsoft Patches Entra ID Role Flaw That Enabled Service Principal Takeover Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering Software Chinese Silk Typhoon Hacker Extradited to U.S. Over COVID Research Cyberattacks Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API Checkmarx Confirms GitHub Repository Data Posted on Dark Web After March 23 Attack ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms +25 New Stories Critical cPanel Authentication Vulnerability Identified — Update Your Server Immediately Apple Fixes iOS Flaw That Let FBI Recover Deleted Signal Messages Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain Campaign Load More ▼ ⭐ Featured Resources [Guide] Learn a Practical Framework to Evaluate AI Tools for Production Learn How Hidden Identity Blind Spots Weaken Your Security Systems [Webinar] Stop Chasing Alerts and Start Focusing on Real Exposures [Guide] How to Enable Secure Data Movement Without Added Risk
    💬 Team Notes
    Article Info
    Source
    The Hacker News
    Category
    ◇ Industry News & Leadership
    Published
    May 05, 2026
    Archived
    May 05, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗