Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Cerberus Stalkerware Abuses Google Play for Leverages Accessibility
May 5, 2026
Education Sector Under Attack: Espionage & Phishing
May 5, 2026
DAEMON Tools Hacked: Supply Chain Attack Software Deliver
May 5, 2026
Home/CyberSecurity News/Critical MOVEit Vulnerabilities Enable Authentication Bypass
CyberSecurity News

Critical MOVEit Vulnerabilities Enable Authentication Bypass

Progress Software has issued a critical security bulletin for its MOVEit Automation platform. The advisory details severe vulnerabilities, including an authentication bypass flaw, that could expose...

Sarah simpson
Sarah simpson
May 4, 2026 2 Min Read
0 0

Progress Software has issued a critical security bulletin for its MOVEit Automation platform. The advisory details severe vulnerabilities, including an authentication bypass flaw, that could expose organizations to unauthorized access. Immediate action is required to apply the necessary updates.

This April 2026 alert warns of two highly severe vulnerabilities that could allow attackers to bypass security checkpoints and gain full system control.

MOVEit Automation is widely used by enterprises to manage and automate secure file transfers, making it a high-value target for cybercriminals.

Organizations using this software must apply the latest patches immediately to prevent unauthorized data access and potential breaches.

MOVEit Authentication Bypass Flaw

The critical alert focuses on two distinct flaws discovered and reported by a team of researchers at Airbus SecLab, including Anaïs Gantet, Delphine Gourdou, Quentin Liddell, and Matteo Ricordeau.

Threat actors can exploit these vulnerabilities directly through the service backend command port interfaces.

If an attacker successfully exploits these flaws, they can bypass login screens, steal sensitive files, and gain complete administrative control of the server.

Security teams should actively hunt for threats by checking their audit logs for unexpected privilege changes or anomalous backend activity.

The technical breakdown of the flaws includes:

  • CVE-2026-4670: A primary weakness causing an authentication bypass, allowing unauthenticated external users to access the system without valid credentials.
  • CVE-2026-5174: An improper input validation vulnerability that results in privilege escalation, letting attackers elevate their standard access to administrative rights.

These security flaws impact several generations of the MOVEit Automation software.

Progress Software urges system administrators to verify their current installation by opening the Web Admin dashboard and checking the “About” section under the “Help” menu.

The vulnerabilities exist in the following software builds:

  • MOVEit Automation 2025.1.4 and all earlier versions.
  • MOVEit Automation 2025.0.8 and all earlier versions.
  • MOVEit Automation 2024.1.7 and all prior versions.

Progress Software has addressed both vulnerabilities in its newest software releases.

Applying these official updates using the full installer is the only recognized method to close the security gaps.

IT teams should plan for a brief system outage while the installation process completes.

Administrators must update their systems to the following secure versions:

  • Upgrade to MOVEit Automation 2025.1.5 to secure the 2025.1 track.
  • Upgrade to MOVEit Automation 2025.0.9 to secure the 2025.0 track.
  • Upgrade to MOVEit Automation 2024.1.8 to secure the 2024.1 track.

Customers with an active maintenance agreement can access the necessary upgrade files directly through the Progress Community portal.

Organizations currently running older, unsupported versions must transition to a modern, supported lifecycle release to ensure their file transfer environments remain secure against these critical threats.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachCVEExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

CISA Warns: cPanel & WHM Vulner Vulnerability Exploited

Next Post

Apache MINA Flaws Enable Critical Remote Code Execution Attacks

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Instagram Ending Encrypted Direct Messages Encryption
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us