CVE-2024-5126: CWE-862 Missing Authorization in lunary-ai lunary-ai/lunary
An improper access control vulnerability exists in the lunary-ai/lunary repository, specifically within the versions.patch functionality for updating prompts. Affected versions include 1.2.2 up to but not including 1.2.25. The vulnerability allows unauthorized users to update prompt details due to insufficient access control checks. This issue was addressed and fixed in version 1.2.25.
AI Analysis
Technical Summary
CVE-2024-5126 identifies a missing authorization vulnerability (CWE-862) in the lunary-ai/lunary open-source project, specifically within the versions.patch functionality responsible for updating prompt details. The vulnerability exists in versions starting from 1.2.2 up to but excluding 1.2.25. The core issue is that the software fails to properly verify whether a user has the necessary permissions before allowing modifications to prompt data. This improper access control allows an attacker with limited privileges (PR:L) to remotely update prompt details without proper authorization, potentially altering or corrupting prompt content. The CVSS v3.0 score of 7.6 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality (C:L), integrity (I:H), and availability (A:L). The vulnerability could be exploited remotely over the network, making it a significant risk for deployments exposed to untrusted users or networks. The issue was addressed and fixed in version 1.2.25 by implementing proper authorization checks to ensure only authorized users can update prompt details. No public exploits have been reported yet, but the vulnerability's nature suggests it could be leveraged for unauthorized data manipulation or disruption of AI prompt workflows.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and availability of AI prompt data managed by lunary-ai/lunary software. Unauthorized prompt modifications could lead to corrupted AI outputs, misinformation, or disruption of AI-driven services, potentially affecting business operations and decision-making processes. Confidentiality impact is limited but present, as unauthorized users might gain insight into prompt details. Organizations relying on lunary-ai/lunary in AI development, research, or production environments could face operational disruptions or reputational damage if attackers exploit this flaw. The risk is heightened for entities with network-exposed instances or multi-tenant environments where privilege boundaries are critical. Given the increasing adoption of AI tools in Europe, especially in technology hubs and research institutions, the vulnerability could have widespread implications if not promptly mitigated.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary to version 1.2.25 or later, where the vulnerability is fixed. Until patching is possible, restrict network access to the lunary-ai/lunary service to trusted users and networks only, employing network segmentation and firewall rules. Implement strict access controls and monitor user activities related to prompt updates to detect unauthorized changes. Employ application-layer logging and alerting for any anomalous prompt modification attempts. Conduct regular audits of prompt data integrity and review user privilege assignments to minimize risk exposure. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting the versions.patch functionality. Finally, educate development and operations teams about the vulnerability to ensure awareness and prompt response to any suspicious activity.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2024-5126: CWE-862 Missing Authorization in lunary-ai lunary-ai/lunary
Description
An improper access control vulnerability exists in the lunary-ai/lunary repository, specifically within the versions.patch functionality for updating prompts. Affected versions include 1.2.2 up to but not including 1.2.25. The vulnerability allows unauthorized users to update prompt details due to insufficient access control checks. This issue was addressed and fixed in version 1.2.25.
AI-Powered Analysis
Technical Analysis
CVE-2024-5126 identifies a missing authorization vulnerability (CWE-862) in the lunary-ai/lunary open-source project, specifically within the versions.patch functionality responsible for updating prompt details. The vulnerability exists in versions starting from 1.2.2 up to but excluding 1.2.25. The core issue is that the software fails to properly verify whether a user has the necessary permissions before allowing modifications to prompt data. This improper access control allows an attacker with limited privileges (PR:L) to remotely update prompt details without proper authorization, potentially altering or corrupting prompt content. The CVSS v3.0 score of 7.6 reflects a high severity, with network attack vector (AV:N), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), and impacts on confidentiality (C:L), integrity (I:H), and availability (A:L). The vulnerability could be exploited remotely over the network, making it a significant risk for deployments exposed to untrusted users or networks. The issue was addressed and fixed in version 1.2.25 by implementing proper authorization checks to ensure only authorized users can update prompt details. No public exploits have been reported yet, but the vulnerability's nature suggests it could be leveraged for unauthorized data manipulation or disruption of AI prompt workflows.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity and availability of AI prompt data managed by lunary-ai/lunary software. Unauthorized prompt modifications could lead to corrupted AI outputs, misinformation, or disruption of AI-driven services, potentially affecting business operations and decision-making processes. Confidentiality impact is limited but present, as unauthorized users might gain insight into prompt details. Organizations relying on lunary-ai/lunary in AI development, research, or production environments could face operational disruptions or reputational damage if attackers exploit this flaw. The risk is heightened for entities with network-exposed instances or multi-tenant environments where privilege boundaries are critical. Given the increasing adoption of AI tools in Europe, especially in technology hubs and research institutions, the vulnerability could have widespread implications if not promptly mitigated.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary to version 1.2.25 or later, where the vulnerability is fixed. Until patching is possible, restrict network access to the lunary-ai/lunary service to trusted users and networks only, employing network segmentation and firewall rules. Implement strict access controls and monitor user activities related to prompt updates to detect unauthorized changes. Employ application-layer logging and alerting for any anomalous prompt modification attempts. Conduct regular audits of prompt data integrity and review user privilege assignments to minimize risk exposure. Additionally, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized API calls targeting the versions.patch functionality. Finally, educate development and operations teams about the vulnerability to ensure awareness and prompt response to any suspicious activity.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-05-19T17:13:17.039Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b27178f764e1f470c50
Added to database: 10/15/2025, 1:01:27 PM
Last enriched: 10/15/2025, 1:29:39 PM
Last updated: 10/16/2025, 3:19:49 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61543: n/a
HighCVE-2025-61541: n/a
HighCVE-2025-61536: n/a
HighCVE-2025-41254: CWE-352: Cross-Site Request Forgery (CSRF) in VMware Spring Framework
MediumCVE-2025-36002: Password in Configuration File in IBM Sterling B2B Integrator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.