Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8764: CWE-1333 Inefficient Regular Expression Complexity in lunary-ai lunary-ai/lunary

0
High
VulnerabilityCVE-2024-8764cvecve-2024-8764cwe-1333
Published: Thu Mar 20 2025 (03/20/2025, 10:09:36 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

A vulnerability in lunary-ai/lunary, as of commit be54057, allows users to upload and execute arbitrary regular expressions on the server side. This can lead to a Denial of Service (DoS) condition, as certain regular expressions can cause excessive resource consumption, blocking the server from processing other requests.

AI-Powered Analysis

AILast updated: 10/15/2025, 13:18:59 UTC

Technical Analysis

CVE-2024-8764 is a vulnerability classified under CWE-1333 (Inefficient Regular Expression Complexity) found in the lunary-ai/lunary project. The issue arises because the software allows users to upload and execute arbitrary regular expressions on the server side without sufficient restrictions or validation. Certain crafted regular expressions can cause catastrophic backtracking or excessive computational overhead, leading to Denial of Service (DoS) by exhausting CPU and memory resources. This vulnerability can be exploited remotely without authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to availability, with no direct confidentiality or integrity compromise. The affected versions are unspecified, suggesting the vulnerability may exist in multiple or all current releases before a patch is issued. No known exploits have been reported in the wild yet, but the nature of the vulnerability makes it a significant risk for service disruption, especially in environments where lunary-ai/lunary is used for AI or machine learning workloads. The vulnerability was reserved in September 2024 and published in March 2025, with a CVSS score of 7.5 (high severity).

Potential Impact

For European organizations, the primary impact is service availability disruption due to DoS conditions triggered by malicious regular expressions. This can affect AI-driven applications relying on lunary-ai/lunary, potentially halting critical business processes or degrading user experience. Industries such as finance, healthcare, and manufacturing that increasingly integrate AI tools may face operational interruptions. The vulnerability could also lead to increased operational costs due to resource exhaustion and incident response efforts. Since exploitation requires no authentication or user interaction, attackers can remotely target exposed services, increasing the attack surface. Organizations with public-facing lunary-ai/lunary deployments are at higher risk. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational threat posed by DoS.

Mitigation Recommendations

1. Implement strict input validation and sanitization to restrict the complexity and structure of user-submitted regular expressions. 2. Employ regex complexity analysis tools or libraries to detect and reject potentially dangerous patterns before execution. 3. Enforce resource usage limits such as CPU timeouts and memory caps on regex processing to prevent resource exhaustion. 4. Isolate regex execution in sandboxed environments or separate processes to contain potential DoS effects. 5. Monitor server performance and set up alerts for unusual spikes in CPU or memory usage indicative of regex abuse. 6. Apply patches or updates from lunary-ai as soon as they become available. 7. Restrict access to regex submission functionalities to trusted users or authenticated sessions where possible. 8. Conduct regular security assessments and code reviews focusing on regex handling components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
@huntr_ai
Date Reserved
2024-09-12T20:16:04.930Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68ef9b2e178f764e1f470e80

Added to database: 10/15/2025, 1:01:34 PM

Last enriched: 10/15/2025, 1:18:59 PM

Last updated: 12/3/2025, 1:03:01 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats