CVE-2024-3504: CWE-863 Incorrect Authorization in lunary-ai lunary-ai/lunary
An improper access control vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, where an admin can update any organization user to the organization owner. This vulnerability allows the elevated user to delete projects within the organization. The issue is resolved in version 1.2.7.
AI Analysis
Technical Summary
CVE-2024-3504 is an authorization bypass vulnerability classified under CWE-863, found in the lunary-ai/lunary software up to version 1.2.2. The flaw arises because an admin user can improperly update any organization user's role to that of the organization owner without sufficient authorization checks. This escalation of privileges allows the attacker to perform critical actions reserved for owners, such as deleting projects within the organization. The vulnerability does not affect confidentiality directly but severely impacts integrity and availability by enabling destructive operations. Exploitation requires the attacker to already have admin-level privileges, but no additional user interaction is needed. The attack vector is network-based with low complexity, meaning an attacker with admin access can remotely exploit this flaw without significant effort. The vulnerability was publicly disclosed on June 6, 2024, with a CVSS v3.0 score of 8.1, indicating high severity. The vendor addressed the issue in lunary-ai/lunary version 1.2.7, which includes proper authorization checks to prevent unauthorized role changes and project deletions.
Potential Impact
For European organizations using lunary-ai/lunary versions up to 1.2.2, this vulnerability poses a significant risk to operational continuity and data integrity. An attacker with admin privileges can escalate to organization owner, gaining full control over organizational projects, including the ability to delete critical projects. This can lead to loss of valuable intellectual property, disruption of business processes, and potential financial and reputational damage. Since lunary-ai/lunary is likely used in collaborative AI or software development environments, the impact extends to project teams and dependent services. The vulnerability does not directly expose confidential data but compromises the integrity and availability of organizational resources. Organizations in sectors with strict data governance and operational resilience requirements, such as finance, healthcare, and critical infrastructure, may face heightened consequences. Additionally, recovery from project deletion may be complex or impossible without proper backups, increasing downtime and recovery costs.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary to version 1.2.7 or later, where the vulnerability is fixed. Until patching is complete, restrict admin privileges to trusted personnel only and audit admin activities closely to detect any unauthorized role changes. Implement strict role-based access controls and monitor logs for unusual privilege escalations or project deletions. Employ backup and recovery procedures to mitigate the impact of potential project deletions. Consider network segmentation and multi-factor authentication for admin accounts to reduce the risk of compromised credentials. Regularly review and update organizational policies around privilege management and incident response to quickly address any exploitation attempts. Engage with the vendor for any additional security advisories or patches related to lunary-ai/lunary.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2024-3504: CWE-863 Incorrect Authorization in lunary-ai lunary-ai/lunary
Description
An improper access control vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, where an admin can update any organization user to the organization owner. This vulnerability allows the elevated user to delete projects within the organization. The issue is resolved in version 1.2.7.
AI-Powered Analysis
Technical Analysis
CVE-2024-3504 is an authorization bypass vulnerability classified under CWE-863, found in the lunary-ai/lunary software up to version 1.2.2. The flaw arises because an admin user can improperly update any organization user's role to that of the organization owner without sufficient authorization checks. This escalation of privileges allows the attacker to perform critical actions reserved for owners, such as deleting projects within the organization. The vulnerability does not affect confidentiality directly but severely impacts integrity and availability by enabling destructive operations. Exploitation requires the attacker to already have admin-level privileges, but no additional user interaction is needed. The attack vector is network-based with low complexity, meaning an attacker with admin access can remotely exploit this flaw without significant effort. The vulnerability was publicly disclosed on June 6, 2024, with a CVSS v3.0 score of 8.1, indicating high severity. The vendor addressed the issue in lunary-ai/lunary version 1.2.7, which includes proper authorization checks to prevent unauthorized role changes and project deletions.
Potential Impact
For European organizations using lunary-ai/lunary versions up to 1.2.2, this vulnerability poses a significant risk to operational continuity and data integrity. An attacker with admin privileges can escalate to organization owner, gaining full control over organizational projects, including the ability to delete critical projects. This can lead to loss of valuable intellectual property, disruption of business processes, and potential financial and reputational damage. Since lunary-ai/lunary is likely used in collaborative AI or software development environments, the impact extends to project teams and dependent services. The vulnerability does not directly expose confidential data but compromises the integrity and availability of organizational resources. Organizations in sectors with strict data governance and operational resilience requirements, such as finance, healthcare, and critical infrastructure, may face heightened consequences. Additionally, recovery from project deletion may be complex or impossible without proper backups, increasing downtime and recovery costs.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary to version 1.2.7 or later, where the vulnerability is fixed. Until patching is complete, restrict admin privileges to trusted personnel only and audit admin activities closely to detect any unauthorized role changes. Implement strict role-based access controls and monitor logs for unusual privilege escalations or project deletions. Employ backup and recovery procedures to mitigate the impact of potential project deletions. Consider network segmentation and multi-factor authentication for admin accounts to reduce the risk of compromised credentials. Regularly review and update organizational policies around privilege management and incident response to quickly address any exploitation attempts. Engage with the vendor for any additional security advisories or patches related to lunary-ai/lunary.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-04-09T02:08:37.707Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b26178f764e1f470b8d
Added to database: 10/15/2025, 1:01:26 PM
Last enriched: 10/15/2025, 1:27:14 PM
Last updated: 10/16/2025, 2:50:00 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumCVE-2025-46752: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.