{"vulnerability": "CVE-2026-5174", "sightings": [{"uuid": "a6c294f7-1d58-48c2-afdc-5e9a3f7dad48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mkq5dxnf622p", "content": "CVE-2026-5174 - Improper Access Control Vulnerability in Progress MOVEit Automation\nCVE ID : CVE-2026-5174\n \n Published : April 30, 2026, 3:07 p.m. | 1\u00a0hour, 11\u00a0minutes ago\n \n Description : Improper input validation vulnerability in Progress Software MOVEit Automation allows P...", "creation_timestamp": "2026-04-30T17:30:59.702622Z"}, {"uuid": "62a816ac-a608-4339-8794-24da7e08fac3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mkq625ohho2f", "content": "\ud83d\udfe0 CVE-2026-5174 - High (7.7)\n\nImproper input validation vulnerability in Progress Software MOVEit Automation allows Privilege E...\n\nhttps://www.thehackerwire.com/vulnerability/CVE-2026-5174/\n\n#infosec #cybersecurity #CVE #vulnerability #security #patchstack", "creation_timestamp": "2026-04-30T17:43:25.730358Z"}, {"uuid": "dd7eadcc-7b6f-46bf-9c15-f6adb75f0f6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://cyber.gc.ca/en/alerts-advisories/progress-security-advisory-av26-410", "content": "", "creation_timestamp": "2026-04-30T12:52:32.000000Z"}, {"uuid": "1843ab4f-8a00-41f1-ba58-3ef7588f3374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/samilaiho.com/post/3mkrfww5nis2y", "content": "MOVEit Automation Critical Security Alert Bulletin \u2013 April 2026 \u2013\n(CVE-2026-4670, CVE-2026-5174)\nURL: community.progress.com/s/article/MO...\nClassification: Critical, Solution: Official Fix, Exploit Maturity: Not Defined, CVSSv3.1: 9.8", "creation_timestamp": "2026-05-01T05:37:25.709880Z"}, {"uuid": "1c746196-5683-4049-a66a-0feb5dd41db4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-5174", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3mkrwxlse6v26", "content": "Critical &amp; high vulns in MOVEit Automation enable auth bypass + priv esc via backend command ports.\n\nCVE-2026-4670\nCVE-2026-5174\n\nMOVEit has been targeted by ransomware groups in the past in mass e\u2026\n\n\ud83d\udd01 RT @ethicalhack3r | reposted by @HackingLZ\nhttps://x.com/ethicalhack3r/status/2050158082911519113", "creation_timestamp": "2026-05-01T10:42:02.255645Z"}]}