{"vulnerability": "CVE-2026-4670", "sightings": [{"uuid": "02160490-9a82-4566-a9b3-9cbaf370b24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-410", "content": "", "creation_timestamp": "2026-04-30T12:52:32.000000Z"}, {"uuid": "85a2900f-a15e-41c0-a06c-ec6612b0507f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkpzzf5hzb2c", "content": "CVE-2026-4670 - Improper Authentication vulnerability in Progress MOVEit Automation\nCVE ID : CVE-2026-4670\n \n Published : April 30, 2026, 3:06 p.m. | 1\u00a0hour, 12\u00a0minutes ago\n \n Description : Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Aut...", "creation_timestamp": "2026-04-30T16:31:23.972829Z"}, {"uuid": "9b019eb5-2d50-46ba-a614-e65956603484", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkq4j2nufc2e", "content": "CVE-2026-4670 - Improper Authentication vulnerability in Progress MOVEit Automation\nCVE ID : CVE-2026-4670\n \n Published : April 30, 2026, 3:06 p.m. | 1\u00a0hour, 12\u00a0minutes ago\n \n Description : Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Aut...", "creation_timestamp": "2026-04-30T17:15:56.847082Z"}, {"uuid": "aed3ac92-9d81-48f8-ba8d-e5562ff7b634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-4670", "type": "seen", "source": "https://bsky.app/profile/offseq.bsky.social/post/3mkqt4re3442p", "content": "\ud83d\udea8 CRITICAL auth bypass in MOVEit Automation (CVSS 9.8). Affected: 2025.0.0 &lt; 2025.0.9, 2024.0.0 &lt; 2024.1.8, prior. Patch status unknown \u2014 restrict exposure &amp; monitor advisories. https://radar.offseq.com/threat/cve-2026-4670-cwe-305-authentication-bypass-by-pri-dff96cb4 #OffSeq #MOVEit #CVE20264670", "creation_timestamp": "2026-05-01T00:00:41.664958Z"}, {"uuid": "795fb703-494c-448e-95e5-f659103143ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkq5rkrm6f2n", "content": "\ud83d\udd34 CVE-2026-4670 - Critical (9.8)\n\nAuthentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation al...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-4670/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-04-30T17:38:37.169210Z"}, {"uuid": "bcfd1045-4dcb-4190-9af3-65b399d86eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3mkrfww5nis2y", "content": "MOVEit Automation Critical Security Alert Bulletin \u2013 April 2026 \u2013\n(CVE-2026-4670, CVE-2026-5174)\nURL: community.progress.com/s/article/MO...\nClassification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8", "creation_timestamp": "2026-05-01T05:37:25.581159Z"}, {"uuid": "9ad56dd2-2ca3-4a46-84c5-8f0bec4fe37c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-4670", "type": "seen", "source": "https://infosec.exchange/users/offseq/statuses/116496376678191120", "content": "\ud83d\udea8 CVE-2026-4670 (CVSS 9.8): CRITICAL auth bypass in MOVEit Automation (2025.0.0 &lt; 2025.0.9, 2024.0.0 &lt; 2024.1.8, prior). Patch pending \u2014 restrict access &amp; monitor advisories. No known in-the-wild exploits. https://radar.offseq.com/threat/cve-2026-4670-cwe-305-authentication-bypass-by-pri-dff96cb4 #OffSeq #MOVEit #CVE20264670", "creation_timestamp": "2026-05-01T00:01:08.454906Z"}, {"uuid": "bba735d4-4e1f-44a8-aba9-df97ae3fe9e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3mkrwxlse6v26", "content": "Critical &amp; high vulns in MOVEit Automation enable auth bypass + priv esc via backend command ports.\n\nCVE-2026-4670\nCVE-2026-5174\n\nMOVEit has been targeted by ransomware groups in the past in mass e\u2026\n\n\ud83d\udd01 RT @ethicalhack3r | reposted by @HackingLZ\nhttps://x.com/ethicalhack3r/status/2050158082911519113", "creation_timestamp": "2026-05-01T10:42:02.089687Z"}, {"uuid": "ae5fc6d2-0fe6-417b-b74e-2aa95ddd5327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3mkzwrwomoc2j", "content": "Critical MOVEit Automation auth bypass vulnerability fixed (CVE-2026-4670)\n\n\ud83d\udcd6 Read more:\nwww.helpnetsecurity.com/2026/05/04/c...\n\n#CyberSecurity #CyberSecurityNews #CVE", "creation_timestamp": "2026-05-04T15:00:21.599495Z"}, {"uuid": "8d2fa667-d6f7-44a4-9727-752e6d7270c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3mkzxn6pjmw2d", "content": "Progress Software alerts on critical MOVEit Automation auth bypass (CVE-2026-4670) affecting versions before 2025.1.5, enabling remote unauthenticated attacks. Over 1,400 instances found, including US gov systems. #MOVEitFlaw #AuthBypass #USA", "creation_timestamp": "2026-05-04T15:15:24.635430Z"}, {"uuid": "806ab10e-f3f5-4289-bba8-3d1f3f8e3f03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://ccb.belgium.be/advisories/warning-critical-authentication-bypass-moveit-automation-cve-2026-4670-patch-immediately", "content": "", "creation_timestamp": "2026-05-04T08:08:49.000000Z"}, {"uuid": "84154582-4df3-45eb-92a4-1da4b67162fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3ml27bvuujh2b", "content": "Progress Software issued a critical alert regarding two severe vulnerabilities in its MOVEit Automation platform, allowing authentication bypass and privilege escalation. CVE-2026-4670 enables unauthenticated access, while CVE-2026-5174 allows attackers to gain administrative rights.", "creation_timestamp": "2026-05-04T17:32:16.654534Z"}, {"uuid": "d3023495-2459-4196-b9f5-4dd1a0c904ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3ml2elkgw7f2p", "content": "\ud83d\udccc CVE-2026-4670 - Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass.\n\nThis issue affects MOVEi... https://www.cyberhub.blog/cves/CVE-2026-4670", "creation_timestamp": "2026-05-04T19:07:07.988222Z"}, {"uuid": "2997a028-8042-4202-9ec5-6b7975f2eba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml2f27kjle2s", "content": "Progress patches critical MOVEit Automation flaws CVE-2026-4670 (auth bypass, CVSS 9.8) and CVE-2026-5174 (input validation, CVSS 7.7) allowing unauthorized admin access. Fixes released for versions &lt;=2025.1.4. #MOVEit #Airbus #Vulnerability", "creation_timestamp": "2026-05-04T19:15:20.678919Z"}, {"uuid": "c65fa793-64f7-41d9-9890-02421db6224d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/pixelsandpulse.bsky.social/post/3ml2f5ehni52s", "content": "Progress's MOVEit Automation has a new critical authentication bypass (CVE-2026-4670) allowing unauthenticated admin access. This isn't just another patch; it's a recurring pattern threatening sensitive data across supply\u2026\n\nhttps://www.tpp.blog/qsb4rda\n\n#cybersecurity #progress #moveitautomation", "creation_timestamp": "2026-05-04T19:17:05.887495Z"}, {"uuid": "298ed445-1fd5-4761-8269-54a059bd30ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2pf3ek4p52", "content": "MOVEit automation flaws could enable full system compromise Progress fixes critical MOVEit Automation flaws, including an authentication bypass bug that could let attackers gain unauthorized access...\n\n#Breaking #News #Security #CVE-2026-4670 #CVE-2026-5174 #Hacking #hacking #news #information [\u2026]", "creation_timestamp": "2026-05-04T22:20:49.769029Z"}, {"uuid": "94c86e66-9b84-421f-a035-365584e9d64e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3ml4fuifrss2e", "content": "\ud83d\udd17 CVE : CVE-2026-4670, CVE-2026-4670, CVE-2026-5174", "creation_timestamp": "2026-05-05T14:35:23.630829Z"}, {"uuid": "5da00cd8-ea13-4cc6-af75-3aa2f62389e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml4jro6tix2d", "content": "Linux kernel flaw CVE-2026-31431 exploited for root access; MOVEit CVE-2026-4670 enables remote breaches; DigiCert revokes 60 certificates after Zhong Stealer exposure; Pentagon advances AI security partnerships. #LinuxSecurity #DataCenter #USA", "creation_timestamp": "2026-05-05T15:45:21.585341Z"}, {"uuid": "d0e17ea0-bcf3-409f-9bb8-d34c9a73dee8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/groovysecurity.bsky.social/post/3ml4j7gaprw2q", "content": "MOVEit Automation patched yesterday \u2014 CVE-2026-4670 + CVE-2026-5174, pre-auth chain to admin.\n\nTwo months back, cPanel CVE-2026-41940: 40K servers exploited from Feb 23, patch April 30.\n\nA version banner says \"remediated.\" Whether the exploit still runs on your config is a different question.", "creation_timestamp": "2026-05-05T15:35:09.932100Z"}, {"uuid": "8cf25fa1-caa6-463f-a594-2c3eabb447f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3ml4mf5zt5d25", "content": "Critical vulnerabilities in MOVEit Automation (CVE-2026-4670 &amp; CVE-2026-5174) demand immediate patching to prevent unauthorized access and privilege escalation. #CyberSecurity #DataProtection #MOVEit Link: thedailytechfeed.com/critical-mov...", "creation_timestamp": "2026-05-05T16:32:03.794576Z"}, {"uuid": "dac80a83-8213-4bca-af9b-04271a667282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3ml5xk5vwpq2w", "content": "Critical 98 MOVEit Automation Flaw Opens Enterprise File Transfer Systems to Unauthenticated Takeover +\u00a0Video\n\nIntroduction: A critical authentication bypass vulnerability (CVE-2026-4670, CVSS 9.8) and a high-severity privilege escalation flaw (CVE-2026-5174, CVSS 7.7) have been disclosed in\u2026", "creation_timestamp": "2026-05-06T05:24:22.041334Z"}, {"uuid": "23e2dfdb-5748-400c-bcde-88ba1e270920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-4670", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2026-0133", "content": "Progress heeft kwetsbaarheden verholpen in MOVEit Automation. De kwetsbaarheid met kenmerk CVE-2026-4670 betreft een bypass van de authenticatie in MOVEit Automation. Een kwaadwillende zonder rechten kan deze kwetsbaarheid misbruiken zonder dat daar gebruikersinteractie voor nodig is. \n\nDe tweede kwetsbaarheid met kenmerk CVE-2026-5174 betreft een onjuiste invoervalidatie in Progress Software MOVEit Automation en maakt privilege-escalatie mogelijk.\n\nDeze kwetsbaarheden zijn aanwezig in versies 2025.0.0 tot maar niet inclusief 2025.0.9, versies 2024.0.0 tot maar niet inclusief 2024.1.8, en alle versies v\u00f3\u00f3r 2024.0.0.", "creation_timestamp": "2026-05-06T07:18:44.000000Z"}]}