CVE-2026-23704

6.5 MEDIUM

📋 TL;DR

This vulnerability allows non-administrative users to upload malicious files that can execute arbitrary scripts in administrators' browsers when accessed. It affects Movable Type 7 series and 8.4 series, which are End-of-Life (EOL) products.

💻 Affected Systems

Products:
  • Movable Type
Versions: 7 series and 8.4 series
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: EOL versions are affected and no longer receive official patches from the vendor.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full system takeover, data theft, or ransomware deployment through browser-based script execution.

🟠

Likely Case

Session hijacking, credential theft, or privilege escalation through cross-site scripting attacks against administrators.

🟢

If Mitigated

Limited impact with proper file upload restrictions and administrator browser security controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated non-admin user access to upload files and administrator interaction to trigger.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.0.6

Vendor Advisory: https://movabletype.org/news/2026/02/mt-906-released.html

Restart Required: Yes

Instructions:

1. Backup your Movable Type installation and database. 2. Download Movable Type 9.0.6 from the official website. 3. Replace existing files with the patched version. 4. Restart the web server and application services.

🔧 Temporary Workarounds

Restrict File Uploads

all

Disable or severely restrict file upload capabilities for non-administrative users.

Modify Movable Type configuration to remove upload permissions from non-admin roles

Content Security Policy

all

Implement strict Content Security Policy headers to prevent script execution from uploaded files.

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to web server configuration

🧯 If You Can't Patch

  • Isolate affected systems from internet access and restrict to internal network only
  • Implement strict monitoring of file upload activities and administrator access patterns

🔍 How to Verify

Check if Vulnerable:

Check Movable Type version via admin interface or by examining the mt-config.cgi file for version information.

Check Version:

grep 'VERSION' /path/to/mt/mt-config.cgi 2>/dev/null || echo 'Check admin interface'

Verify Fix Applied:

Verify installation shows version 9.0.6 or later in the admin dashboard.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns from non-admin users
  • Administrator accessing recently uploaded files with suspicious extensions

Network Indicators:

  • Unexpected outbound connections from administrator workstations after file access

SIEM Query:

source="movabletype" AND (event="file_upload" AND user_role!="admin") OR (event="file_access" AND user_role="admin")

🔗 References

📤 Share & Export