Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5126: CWE-862 Missing Authorization in lunary-ai lunary-ai/lunary

0
High
VulnerabilityCVE-2024-5126cvecve-2024-5126cwe-862
Published: Thu Jun 06 2024 (06/06/2024, 18:11:28 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

An improper access control vulnerability exists in the lunary-ai/lunary repository, specifically within the versions.patch functionality for updating prompts. Affected versions include 1.2.2 up to but not including 1.2.25. The vulnerability allows unauthorized users to update prompt details due to insufficient access control checks. This issue was addressed and fixed in version 1.2.25.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:29:39 UTC

Technical Analysis

CVE-2024-5126 identifies a missing authorization vulnerability (CWE-862) in the lunary-ai/lunary open-source project, specifically within the versions.patch functionality responsible for updating prompt details. The vulnerability exists in versions starting from 1.2.2 up to but excluding 1.2.25. The core issue is that the software fails to properly verify whether a user has the necessary permissions before allowing modifications to prompt data. This improper access control allows an attacker with limited privileges (PR:L) to remotely update prompt details without proper authorization, potentially altering or corrupting prompt content. The CVSS v3.0 score of 7.6 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality (C:L), integrity (I:H), and availability (A:L). The vulnerability could be exploited remotely over the network, making it a significant risk for deployments exposed to untrusted users or networks. The issue was addressed and fixed in version 1.2.25 by implementing proper authorization checks to ensure only authorized users can update prompt details. No public exploits have been reported yet, but the vulnerability's nature suggests it could be leveraged for unauthorized data manipulation or disruption of AI prompt workflows.

Potential Impact

For European organizations, this vulnerability poses a risk to the integrity and availability of AI prompt data managed by lunary-ai/lunary software. Unauthorized prompt modifications could lead to corrupted AI outputs, misinformation, or disruption of AI-driven services, potentially affecting business operations and decision-making processes. Confidentiality impact is limited but present, as unauthorized users might gain insight into prompt details. Organizations relying on lunary-ai/lunary in AI development, research, or production environments could face operational disruptions or reputational damage if attackers exploit this flaw. The risk is heightened for entities with network-exposed instances or multi-tenant environments where privilege boundaries are critical. Given the increasing adoption of AI tools in Europe, especially in technology hubs and research institutions, the vulnerability could have widespread implications if not promptly mitigated.

Mitigation Recommendations

European organizations should immediately upgrade lunary-ai/lunary to version 1.2.25 or later, where the vulnerability is fixed. Until patching is possible, restrict network access to the lunary-ai/lunary service to trusted users and networks only, employing network segmentation and firewall rules. Implement strict access controls and monitor user activities related to prompt updates to detect unauthorized changes. Employ application-layer logging and alerting for any anomalous prompt modification attempts. Conduct regular audits of prompt data integrity and review user privilege assignments to minimize risk exposure. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting the versions.patch functionality. Finally, educate development and operations teams about the vulnerability to ensure awareness and prompt response to any suspicious activity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-05-19T17:13:17.039Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b27178f764e1f470c50

Added to database: 10/15/2025, 1:01:27 PM

Last enriched: 10/15/2025, 1:29:39 PM

Last updated: 10/16/2025, 3:19:49 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats