CVE-2024-6087: CWE-639 Authorization Bypass Through User-Controlled Key in lunary-ai lunary-ai/lunary
An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover.
AI Analysis
Technical Summary
CVE-2024-6087 is an improper access control vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the lunary-ai/lunary project. The flaw exists in the 'invite user' functionality, where an attacker can generate authentication tokens intended for invited users. Specifically, the attacker invites a target's email address, receives a one-time use token linked to that invitation, then retracts the invite to prevent the target from accepting it normally. Later, the attacker uses this token to reset the target user's password, effectively bypassing normal authorization checks and gaining full account control. This attack chain leverages the system's failure to properly validate token usage and lifecycle, allowing reuse of tokens that should have been invalidated or restricted. The vulnerability requires the attacker to have privileges to invite users but does not require interaction from the target user. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No patches or exploits are currently reported, but the vulnerability poses a significant risk of account takeover and unauthorized access to sensitive data within affected organizations.
Potential Impact
For European organizations using lunary-ai/lunary, this vulnerability could lead to unauthorized account takeovers, exposing sensitive organizational data and potentially allowing attackers to impersonate legitimate users. The confidentiality breach could result in leakage of proprietary information, internal communications, or AI model data. Although the vulnerability does not directly affect system integrity or availability, compromised accounts could be leveraged for further lateral movement or social engineering attacks. Organizations in sectors with high reliance on AI collaboration platforms—such as technology firms, research institutions, and startups—face elevated risks. The medium severity rating reflects that while exploitation requires some privileges, the impact on confidentiality is high, making it a critical concern for protecting user identities and access controls. The absence of known exploits suggests a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
To mitigate CVE-2024-6087, organizations should first verify if they are using affected versions of lunary-ai/lunary and monitor vendor communications for official patches or updates. In the absence of patches, restrict the ability to invite users to highly trusted administrators only, minimizing the attack surface. Implement strict monitoring and alerting on invitation and password reset activities to detect suspicious patterns such as invite retractions followed by password resets. Enforce multi-factor authentication (MFA) on all user accounts to reduce the risk of account takeover even if credentials are compromised. Review and harden token lifecycle management by invalidating invite tokens immediately upon retraction and ensuring tokens cannot be reused. Conduct regular access reviews and audit logs for unusual behavior. Additionally, educate users about phishing and social engineering risks that could compound the impact of compromised accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2024-6087: CWE-639 Authorization Bypass Through User-Controlled Key in lunary-ai lunary-ai/lunary
Description
An improper access control vulnerability exists in lunary-ai/lunary at the latest commit (a761d83) on the main branch. The vulnerability allows an attacker to use the auth tokens issued by the 'invite user' functionality to obtain valid JWT tokens. These tokens can be used to compromise target users upon registration for their own arbitrary organizations. The attacker can invite a target email, obtain a one-time use token, retract the invite, and later use the token to reset the password of the target user, leading to full account takeover.
AI-Powered Analysis
Technical Analysis
CVE-2024-6087 is an improper access control vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the lunary-ai/lunary project. The flaw exists in the 'invite user' functionality, where an attacker can generate authentication tokens intended for invited users. Specifically, the attacker invites a target's email address, receives a one-time use token linked to that invitation, then retracts the invite to prevent the target from accepting it normally. Later, the attacker uses this token to reset the target user's password, effectively bypassing normal authorization checks and gaining full account control. This attack chain leverages the system's failure to properly validate token usage and lifecycle, allowing reuse of tokens that should have been invalidated or restricted. The vulnerability requires the attacker to have privileges to invite users but does not require interaction from the target user. The CVSS 3.0 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, high confidentiality impact, and no impact on integrity or availability. No patches or exploits are currently reported, but the vulnerability poses a significant risk of account takeover and unauthorized access to sensitive data within affected organizations.
Potential Impact
For European organizations using lunary-ai/lunary, this vulnerability could lead to unauthorized account takeovers, exposing sensitive organizational data and potentially allowing attackers to impersonate legitimate users. The confidentiality breach could result in leakage of proprietary information, internal communications, or AI model data. Although the vulnerability does not directly affect system integrity or availability, compromised accounts could be leveraged for further lateral movement or social engineering attacks. Organizations in sectors with high reliance on AI collaboration platforms—such as technology firms, research institutions, and startups—face elevated risks. The medium severity rating reflects that while exploitation requires some privileges, the impact on confidentiality is high, making it a critical concern for protecting user identities and access controls. The absence of known exploits suggests a window for proactive mitigation before widespread abuse occurs.
Mitigation Recommendations
To mitigate CVE-2024-6087, organizations should first verify if they are using affected versions of lunary-ai/lunary and monitor vendor communications for official patches or updates. In the absence of patches, restrict the ability to invite users to highly trusted administrators only, minimizing the attack surface. Implement strict monitoring and alerting on invitation and password reset activities to detect suspicious patterns such as invite retractions followed by password resets. Enforce multi-factor authentication (MFA) on all user accounts to reduce the risk of account takeover even if credentials are compromised. Review and harden token lifecycle management by invalidating invite tokens immediately upon retraction and ensuring tokens cannot be reused. Conduct regular access reviews and audit logs for unusual behavior. Additionally, educate users about phishing and social engineering risks that could compound the impact of compromised accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-06-17T17:49:59.828Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2a178f764e1f470d18
Added to database: 10/15/2025, 1:01:30 PM
Last enriched: 10/15/2025, 1:37:49 PM
Last updated: 10/16/2025, 2:44:57 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-41253: CWE-917: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') in VMware Spring Cloud Gateway Server Webflux
HighMicrosoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign
MediumCVE-2025-54658: Escalation of privilege in Fortinet FortiDLP
HighCVE-2025-53951: Escalation of privilege in Fortinet FortiDLP
MediumCVE-2025-53950: Information disclosure in Fortinet FortiDLP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.