CVE-2024-11137: CWE-639 Authorization Bypass Through User-Controlled Key in lunary-ai lunary-ai/lunary
An Insecure Direct Object Reference (IDOR) vulnerability exists in the `PATCH /v1/runs/:id/score` endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter in the request URL, which corresponds to the `runId_score` in the database. The endpoint does not sufficiently validate whether the authenticated user has permission to modify the specified runId, enabling an attacker with a valid account to modify other users' runId scores by specifying different id values. This issue was fixed in version 1.6.1.
AI Analysis
Technical Summary
CVE-2024-11137 is a high-severity authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in lunary-ai/lunary version 1.6.0. The vulnerability exists in the PATCH /v1/runs/:id/score API endpoint, which is designed to update the score data associated with a specific run identified by the 'id' parameter. Due to insufficient authorization validation, the endpoint fails to verify whether the authenticated user has permission to modify the specified runId_score in the database. Consequently, an attacker with any valid account can manipulate the 'id' parameter to alter the score data of runs owned by other users. This represents an Insecure Direct Object Reference (IDOR) flaw, allowing unauthorized data modification without requiring elevated privileges or user interaction. The vulnerability impacts data integrity but does not affect confidentiality or availability directly. The issue was addressed and fixed in lunary-ai/lunary version 1.6.1 by implementing proper authorization checks to ensure users can only modify their own run scores. The CVSS v3.0 score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on integrity. Although no known exploits are currently reported in the wild, the vulnerability poses a serious risk to organizations relying on this software for accurate and trustworthy run scoring data.
Potential Impact
For European organizations using lunary-ai/lunary, this vulnerability can lead to unauthorized modification of critical scoring data, potentially undermining the integrity of analytics, reporting, or decision-making processes that depend on this data. This could affect sectors relying on AI-driven run evaluations, such as research institutions, AI development companies, or any enterprise integrating lunary-ai/lunary into their workflows. The unauthorized data manipulation could result in incorrect performance metrics, loss of trust in system outputs, and potential compliance issues if data integrity is mandated by regulations. While confidentiality and availability are not directly impacted, the integrity breach could indirectly affect business operations and stakeholder confidence. The ease of exploitation (no privilege escalation or user interaction required) increases the risk of internal or external attackers with valid accounts exploiting this flaw. Organizations failing to upgrade may face reputational damage or operational disruptions if attackers manipulate run scores maliciously.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary to version 1.6.1 or later, where the vulnerability is fixed. In addition to patching, organizations should implement strict access control policies and audit logs to monitor modifications to run scores, enabling detection of unauthorized changes. Employing role-based access control (RBAC) or attribute-based access control (ABAC) can further restrict who can modify run data. Conduct regular security reviews and penetration testing focusing on API endpoints to identify similar authorization weaknesses. Network segmentation and limiting API access to trusted users and systems can reduce exposure. Finally, educate developers on secure coding practices to prevent IDOR vulnerabilities by enforcing server-side authorization checks on all user-controlled parameters.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2024-11137: CWE-639 Authorization Bypass Through User-Controlled Key in lunary-ai lunary-ai/lunary
Description
An Insecure Direct Object Reference (IDOR) vulnerability exists in the `PATCH /v1/runs/:id/score` endpoint of lunary-ai/lunary version 1.6.0. This vulnerability allows an attacker to update the score data of any run by manipulating the id parameter in the request URL, which corresponds to the `runId_score` in the database. The endpoint does not sufficiently validate whether the authenticated user has permission to modify the specified runId, enabling an attacker with a valid account to modify other users' runId scores by specifying different id values. This issue was fixed in version 1.6.1.
AI-Powered Analysis
Technical Analysis
CVE-2024-11137 is a high-severity authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in lunary-ai/lunary version 1.6.0. The vulnerability exists in the PATCH /v1/runs/:id/score API endpoint, which is designed to update the score data associated with a specific run identified by the 'id' parameter. Due to insufficient authorization validation, the endpoint fails to verify whether the authenticated user has permission to modify the specified runId_score in the database. Consequently, an attacker with any valid account can manipulate the 'id' parameter to alter the score data of runs owned by other users. This represents an Insecure Direct Object Reference (IDOR) flaw, allowing unauthorized data modification without requiring elevated privileges or user interaction. The vulnerability impacts data integrity but does not affect confidentiality or availability directly. The issue was addressed and fixed in lunary-ai/lunary version 1.6.1 by implementing proper authorization checks to ensure users can only modify their own run scores. The CVSS v3.0 score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on integrity. Although no known exploits are currently reported in the wild, the vulnerability poses a serious risk to organizations relying on this software for accurate and trustworthy run scoring data.
Potential Impact
For European organizations using lunary-ai/lunary, this vulnerability can lead to unauthorized modification of critical scoring data, potentially undermining the integrity of analytics, reporting, or decision-making processes that depend on this data. This could affect sectors relying on AI-driven run evaluations, such as research institutions, AI development companies, or any enterprise integrating lunary-ai/lunary into their workflows. The unauthorized data manipulation could result in incorrect performance metrics, loss of trust in system outputs, and potential compliance issues if data integrity is mandated by regulations. While confidentiality and availability are not directly impacted, the integrity breach could indirectly affect business operations and stakeholder confidence. The ease of exploitation (no privilege escalation or user interaction required) increases the risk of internal or external attackers with valid accounts exploiting this flaw. Organizations failing to upgrade may face reputational damage or operational disruptions if attackers manipulate run scores maliciously.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary to version 1.6.1 or later, where the vulnerability is fixed. In addition to patching, organizations should implement strict access control policies and audit logs to monitor modifications to run scores, enabling detection of unauthorized changes. Employing role-based access control (RBAC) or attribute-based access control (ABAC) can further restrict who can modify run data. Conduct regular security reviews and penetration testing focusing on API endpoints to identify similar authorization weaknesses. Network segmentation and limiting API access to trusted users and systems can reduce exposure. Finally, educate developers on secure coding practices to prevent IDOR vulnerabilities by enforcing server-side authorization checks on all user-controlled parameters.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-11-12T12:22:46.390Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b23178f764e1f470a79
Added to database: 10/15/2025, 1:01:23 PM
Last enriched: 10/15/2025, 1:21:02 PM
Last updated: 10/16/2025, 12:42:02 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-55072: Cross-site scripting (XSS) in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.