Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3504: CWE-863 Incorrect Authorization in lunary-ai lunary-ai/lunary

0
High
VulnerabilityCVE-2024-3504cvecve-2024-3504cwe-863
Published: Thu Jun 06 2024 (06/06/2024, 17:53:40 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

An improper access control vulnerability exists in lunary-ai/lunary versions up to and including 1.2.2, where an admin can update any organization user to the organization owner. This vulnerability allows the elevated user to delete projects within the organization. The issue is resolved in version 1.2.7.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:27:14 UTC

Technical Analysis

CVE-2024-3504 is an authorization bypass vulnerability classified under CWE-863, found in the lunary-ai/lunary software up to version 1.2.2. The flaw arises because an admin user can improperly update any organization user's role to that of the organization owner without sufficient authorization checks. This escalation of privileges allows the attacker to perform critical actions reserved for owners, such as deleting projects within the organization. The vulnerability does not affect confidentiality directly but severely impacts integrity and availability by enabling destructive operations. Exploitation requires the attacker to already have admin-level privileges, but no additional user interaction is needed. The attack vector is network-based with low complexity, meaning an attacker with admin access can remotely exploit this flaw without significant effort. The vulnerability was publicly disclosed on June 6, 2024, with a CVSS v3.0 score of 8.1, indicating high severity. The vendor addressed the issue in lunary-ai/lunary version 1.2.7, which includes proper authorization checks to prevent unauthorized role changes and project deletions.

Potential Impact

For European organizations using lunary-ai/lunary versions up to 1.2.2, this vulnerability poses a significant risk to operational continuity and data integrity. An attacker with admin privileges can escalate to organization owner, gaining full control over organizational projects, including the ability to delete critical projects. This can lead to loss of valuable intellectual property, disruption of business processes, and potential financial and reputational damage. Since lunary-ai/lunary is likely used in collaborative AI or software development environments, the impact extends to project teams and dependent services. The vulnerability does not directly expose confidential data but compromises the integrity and availability of organizational resources. Organizations in sectors with strict data governance and operational resilience requirements, such as finance, healthcare, and critical infrastructure, may face heightened consequences. Additionally, recovery from project deletion may be complex or impossible without proper backups, increasing downtime and recovery costs.

Mitigation Recommendations

European organizations should immediately upgrade lunary-ai/lunary to version 1.2.7 or later, where the vulnerability is fixed. Until patching is complete, restrict admin privileges to trusted personnel only and audit admin activities closely to detect any unauthorized role changes. Implement strict role-based access controls and monitor logs for unusual privilege escalations or project deletions. Employ backup and recovery procedures to mitigate the impact of potential project deletions. Consider network segmentation and multi-factor authentication for admin accounts to reduce the risk of compromised credentials. Regularly review and update organizational policies around privilege management and incident response to quickly address any exploitation attempts. Engage with the vendor for any additional security advisories or patches related to lunary-ai/lunary.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-04-09T02:08:37.707Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b26178f764e1f470b8d

Added to database: 10/15/2025, 1:01:26 PM

Last enriched: 10/15/2025, 1:27:14 PM

Last updated: 10/16/2025, 2:50:00 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats