CVE-2024-7472: CWE-93 Improper Neutralization of CRLF Sequences in lunary-ai lunary-ai/lunary
lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage.
AI Analysis
Technical Summary
CVE-2024-7472 is classified under CWE-93, indicating improper neutralization of CRLF sequences, which leads to an email injection vulnerability in lunary-ai/lunary version 1.2.26. The vulnerability specifically affects the Send email verification API (/v1/users/send-verification) and the Sign up API (/auth/signup). The root cause is the failure of the extractFirstName function to properly sanitize input when alternate whitespace characters such as non-breaking spaces (\xa0) are used. This allows an unauthenticated attacker to inject arbitrary data into the headers or body of outgoing emails generated by the application. Exploiting this vulnerability can facilitate phishing attacks by manipulating email content, potentially misleading recipients into divulging sensitive information or executing malicious actions. Additionally, such injection can damage the application's brand reputation, cause compliance violations (e.g., GDPR or anti-spam laws), and lead to financial consequences due to misuse of the email system. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although no public exploits are known at this time, the medium CVSS score (5.3) reflects moderate impact primarily on confidentiality with no direct integrity or availability effects. The vulnerability highlights the importance of robust input validation and output encoding in email-related functionalities.
Potential Impact
For European organizations, this vulnerability poses a risk of phishing campaigns that can compromise user credentials or sensitive data, undermining trust in digital services. The injection of malicious content into verification or signup emails can lead to widespread user deception, potentially affecting customer retention and brand integrity. Legal and compliance risks are significant in Europe due to stringent regulations such as GDPR and ePrivacy Directive, which mandate secure handling of personal data and communication. Unauthorized email usage could result in regulatory fines and damage to corporate reputation. Financial impacts may arise from incident response costs, remediation efforts, and potential fraud resulting from successful phishing attacks. Organizations relying on lunary-ai/lunary for user authentication or communication should consider this vulnerability a moderate threat that could disrupt secure user onboarding and verification processes.
Mitigation Recommendations
Organizations should immediately review and update lunary-ai/lunary to a patched version once available. In the absence of a patch, implement strict input validation and sanitization on all user-supplied data, especially focusing on whitespace normalization to prevent bypasses using non-standard characters like \xa0. Employ output encoding techniques to neutralize CRLF sequences before including user data in email headers or bodies. Monitor outgoing emails for anomalous content that may indicate injection attempts. Implement email security controls such as SPF, DKIM, and DMARC to reduce the impact of phishing emails. Conduct user awareness training to recognize phishing attempts originating from legitimate-looking emails. Additionally, audit logs for suspicious API usage patterns and consider rate limiting or CAPTCHA challenges on the affected endpoints to reduce automated exploitation risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2024-7472: CWE-93 Improper Neutralization of CRLF Sequences in lunary-ai lunary-ai/lunary
Description
lunary-ai/lunary v1.2.26 contains an email injection vulnerability in the Send email verification API (/v1/users/send-verification) and Sign up API (/auth/signup). An unauthenticated attacker can inject data into outgoing emails by bypassing the extractFirstName function using a different whitespace character (e.g., \xa0). This vulnerability can be exploited to conduct phishing attacks, damage the application's brand, cause legal and compliance issues, and result in financial impact due to unauthorized email usage.
AI-Powered Analysis
Technical Analysis
CVE-2024-7472 is classified under CWE-93, indicating improper neutralization of CRLF sequences, which leads to an email injection vulnerability in lunary-ai/lunary version 1.2.26. The vulnerability specifically affects the Send email verification API (/v1/users/send-verification) and the Sign up API (/auth/signup). The root cause is the failure of the extractFirstName function to properly sanitize input when alternate whitespace characters such as non-breaking spaces (\xa0) are used. This allows an unauthenticated attacker to inject arbitrary data into the headers or body of outgoing emails generated by the application. Exploiting this vulnerability can facilitate phishing attacks by manipulating email content, potentially misleading recipients into divulging sensitive information or executing malicious actions. Additionally, such injection can damage the application's brand reputation, cause compliance violations (e.g., GDPR or anti-spam laws), and lead to financial consequences due to misuse of the email system. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although no public exploits are known at this time, the medium CVSS score (5.3) reflects moderate impact primarily on confidentiality with no direct integrity or availability effects. The vulnerability highlights the importance of robust input validation and output encoding in email-related functionalities.
Potential Impact
For European organizations, this vulnerability poses a risk of phishing campaigns that can compromise user credentials or sensitive data, undermining trust in digital services. The injection of malicious content into verification or signup emails can lead to widespread user deception, potentially affecting customer retention and brand integrity. Legal and compliance risks are significant in Europe due to stringent regulations such as GDPR and ePrivacy Directive, which mandate secure handling of personal data and communication. Unauthorized email usage could result in regulatory fines and damage to corporate reputation. Financial impacts may arise from incident response costs, remediation efforts, and potential fraud resulting from successful phishing attacks. Organizations relying on lunary-ai/lunary for user authentication or communication should consider this vulnerability a moderate threat that could disrupt secure user onboarding and verification processes.
Mitigation Recommendations
Organizations should immediately review and update lunary-ai/lunary to a patched version once available. In the absence of a patch, implement strict input validation and sanitization on all user-supplied data, especially focusing on whitespace normalization to prevent bypasses using non-standard characters like \xa0. Employ output encoding techniques to neutralize CRLF sequences before including user data in email headers or bodies. Monitor outgoing emails for anomalous content that may indicate injection attempts. Implement email security controls such as SPF, DKIM, and DMARC to reduce the impact of phishing emails. Conduct user awareness training to recognize phishing attempts originating from legitimate-looking emails. Additionally, audit logs for suspicious API usage patterns and consider rate limiting or CAPTCHA challenges on the affected endpoints to reduce automated exploitation risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-08-04T13:38:41.689Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2b178f764e1f470d8b
Added to database: 10/15/2025, 1:01:31 PM
Last enriched: 10/15/2025, 1:35:43 PM
Last updated: 10/16/2025, 12:42:18 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.