{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreicg64h42pop363izveyr7v7jyodfcvbmcz2vc24mmu43a6ojpbl5i",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3ml6uu2yh6yr2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreieihnznk6m2zpb4wvzlslzhysopk7rubbi2prireaotphhztxritq"
    },
    "mimeType": "image/webp",
    "size": 16418
  },
  "path": "/critical-moveit-automation-vulnerabilities-allow-authentication-bypass-and-privilege-escalation/",
  "publishedAt": "2026-05-05T16:50:50.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Critical MOVEit Automation vulnerabilities allow authentication bypass and privilege escalation",
    "VPN Central"
  ],
  "textContent": "Progress Software has patched two serious MOVEit Automation vulnerabilities that can let attackers bypass authentication, escalate privileges, and potentially gain administrative control of affected systems. The flaws are tracked as CVE-2026-4670 and CVE-2026-5174. The first is a critical authentication bypass issue with a CVSS score of 9.8, while the second is a high-severity privilege escalation […]\n\nThe post Critical MOVEit Automation vulnerabilities allow authentication bypass and privilege escalation appeared first on VPN Central.",
  "title": "Critical MOVEit Automation vulnerabilities allow authentication bypass and privilege escalation"
}