Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11300: CWE-639 Authorization Bypass Through User-Controlled Key in lunary-ai lunary-ai/lunary

0
High
VulnerabilityCVE-2024-11300cvecve-2024-11300cwe-639
Published: Thu Mar 20 2025 (03/20/2025, 10:11:19 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

In lunary-ai/lunary before version 1.6.3, an improper access control vulnerability exists where a user can access prompt data of another user. This issue affects version 1.6.2 and the main branch. The vulnerability allows unauthorized users to view sensitive prompt data by accessing specific URLs, leading to potential exposure of critical information.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:21:40 UTC

Technical Analysis

CVE-2024-11300 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the lunary-ai/lunary product before version 1.6.3. The flaw arises due to improper access control mechanisms that fail to adequately verify user permissions when accessing prompt data via URLs containing user-controlled keys. This allows an attacker with limited privileges (PR:L) to craft requests that access prompt data belonging to other users, thereby breaching confidentiality and potentially integrity and availability of sensitive data. The vulnerability has a CVSS 3.0 base score of 8.8, indicating high severity, with attack vector network (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the ease of exploitation and the critical nature of the data involved make this a significant threat. The vulnerability affects version 1.6.2 and the main development branch, with no patch links provided yet, but version 1.6.3 is indicated as fixed. The root cause is insufficient validation of user authorization when accessing resources identified by user-controlled keys, allowing unauthorized data access.

Potential Impact

For European organizations, especially those leveraging lunary-ai/lunary for AI prompt management or related services, this vulnerability poses a serious risk of sensitive data exposure. Confidential prompt data could include proprietary AI instructions, user inputs, or other critical information that, if leaked, could lead to intellectual property theft, privacy violations, or competitive disadvantage. The integrity of prompt data could also be compromised if attackers manipulate or access data they should not. Availability impact is possible if attackers exploit the flaw to disrupt services or cause denial of access to legitimate users. Sectors such as technology companies, AI research institutions, and enterprises integrating AI-driven workflows are particularly vulnerable. The cross-user data exposure can also lead to regulatory compliance issues under GDPR, potentially resulting in fines and reputational damage.

Mitigation Recommendations

Organizations should immediately upgrade lunary-ai/lunary to version 1.6.3 or later where the vulnerability is fixed. Until patching is possible, implement strict access control checks at the application layer to validate user permissions against requested resources, ensuring that user-controlled keys cannot be used to access unauthorized data. Employ robust logging and monitoring of access patterns to detect anomalous requests that may indicate exploitation attempts. Use network segmentation and least privilege principles to limit exposure of the lunary-ai/lunary service. Conduct regular security assessments and code reviews focusing on authorization logic. Additionally, consider implementing Web Application Firewalls (WAFs) with custom rules to block suspicious URL patterns. Educate developers and administrators about the risks of CWE-639 to prevent similar issues in future development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-11-16T09:15:59.924Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b24178f764e1f470ada

Added to database: 10/15/2025, 1:01:24 PM

Last enriched: 10/15/2025, 1:21:40 PM

Last updated: 11/28/2025, 4:14:32 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats