Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7472: CWE-93 Improper Neutralization of CRLF Sequences in lunary-ai lunary-ai/lunary

0
Medium
VulnerabilityCVE-2024-7472cvecve-2024-7472cwe-93
Published: Tue Oct 29 2024 (10/29/2024, 12:49:50 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:35:43 UTC

Technical Analysis

CVE-2024-7472 is classified under CWE-93, indicating improper neutralization of CRLF sequences, which leads to an email injection vulnerability in lunary-ai/lunary version 1.2.26. The vulnerability specifically affects the Send email verification API (/v1/users/send-verification) and the Sign up API (/auth/signup). The root cause is the failure of the extractFirstName function to properly sanitize input when alternate whitespace characters such as non-breaking spaces (\xa0) are used. This allows an unauthenticated attacker to inject arbitrary data into the headers or body of outgoing emails generated by the application. Exploiting this vulnerability can facilitate phishing attacks by manipulating email content, potentially misleading recipients into divulging sensitive information or executing malicious actions. Additionally, such injection can damage the application's brand reputation, cause compliance violations (e.g., GDPR or anti-spam laws), and lead to financial consequences due to misuse of the email system. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although no public exploits are known at this time, the medium CVSS score (5.3) reflects moderate impact primarily on confidentiality with no direct integrity or availability effects. The vulnerability highlights the importance of robust input validation and output encoding in email-related functionalities.

Potential Impact

For European organizations, this vulnerability poses a risk of phishing campaigns that can compromise user credentials or sensitive data, undermining trust in digital services. The injection of malicious content into verification or signup emails can lead to widespread user deception, potentially affecting customer retention and brand integrity. Legal and compliance risks are significant in Europe due to stringent regulations such as GDPR and ePrivacy Directive, which mandate secure handling of personal data and communication. Unauthorized email usage could result in regulatory fines and damage to corporate reputation. Financial impacts may arise from incident response costs, remediation efforts, and potential fraud resulting from successful phishing attacks. Organizations relying on lunary-ai/lunary for user authentication or communication should consider this vulnerability a moderate threat that could disrupt secure user onboarding and verification processes.

Mitigation Recommendations

Organizations should immediately review and update lunary-ai/lunary to a patched version once available. In the absence of a patch, implement strict input validation and sanitization on all user-supplied data, especially focusing on whitespace normalization to prevent bypasses using non-standard characters like \xa0. Employ output encoding techniques to neutralize CRLF sequences before including user data in email headers or bodies. Monitor outgoing emails for anomalous content that may indicate injection attempts. Implement email security controls such as SPF, DKIM, and DMARC to reduce the impact of phishing emails. Conduct user awareness training to recognize phishing attempts originating from legitimate-looking emails. Additionally, audit logs for suspicious API usage patterns and consider rate limiting or CAPTCHA challenges on the affected endpoints to reduce automated exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-08-04T13:38:41.689Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2b178f764e1f470d8b

Added to database: 10/15/2025, 1:01:31 PM

Last enriched: 10/15/2025, 1:35:43 PM

Last updated: 10/16/2025, 12:42:18 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats