CVE-2024-9000: CWE-862 Missing Authorization in lunary-ai lunary-ai/lunary
In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additionally, the endpoint does not validate the uniqueness of the slug field when creating a new checklist, allowing an attacker to spoof existing checklists by reusing the slug of an already-existing checklist. This can lead to significant data integrity issues, as legitimate checklists can be replaced with malicious or altered data.
AI Analysis
Technical Summary
CVE-2024-9000 is a vulnerability identified in the lunary-ai/lunary software before version 1.4.26, specifically affecting the checklists.post() endpoint. This endpoint is responsible for creating or modifying checklist entries within the application. The core issue is a missing authorization check (CWE-862), meaning the system does not verify whether the user making the request has the appropriate permissions to perform these actions. Consequently, any authenticated user with access to this endpoint can create or modify checklists regardless of their privileges. Furthermore, the endpoint does not enforce uniqueness on the 'slug' field, which is presumably used as a unique identifier or URL-friendly key for checklists. Attackers can exploit this by reusing the slug of an existing checklist to overwrite or spoof legitimate entries, leading to data integrity violations. The vulnerability has a CVSS v3.0 base score of 7.1, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requires privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). This means an attacker with some level of authenticated access can remotely exploit this vulnerability without user interaction, potentially altering critical checklist data. No public exploits have been reported yet, but the vulnerability poses a significant risk to data integrity and trustworthiness of checklist data within affected deployments.
Potential Impact
For European organizations, the impact of CVE-2024-9000 can be substantial, especially for those relying on lunary-ai/lunary for operational workflows, project management, or compliance tracking. Unauthorized creation or modification of checklists can lead to misinformation, disruption of business processes, and potential compliance violations if checklists are used for audit or regulatory purposes. The ability to spoof existing checklists by slug reuse further exacerbates the risk by allowing attackers to replace legitimate data with malicious or misleading content, undermining data integrity and trust. This could result in erroneous decision-making, operational delays, or exposure to further attacks if malicious data is used as a vector. While the vulnerability requires some level of authentication, insider threats or compromised accounts could easily exploit it. The absence of availability impact reduces the risk of denial-of-service, but the integrity compromise alone is critical. Organizations in sectors such as finance, healthcare, manufacturing, and government—where checklist accuracy is vital—are particularly at risk.
Mitigation Recommendations
To mitigate CVE-2024-9000, organizations should immediately upgrade lunary-ai/lunary to version 1.4.26 or later where the vulnerability is patched. If upgrading is not immediately feasible, implement strict access controls to limit who can authenticate and access the checklists.post() endpoint, ideally restricting it to trusted administrators or service accounts. Employ application-layer firewalls or API gateways to monitor and block unauthorized modification attempts. Implement logging and alerting on checklist creation and modification activities to detect suspicious behavior. Additionally, validate and enforce uniqueness of the slug field at the application or database level to prevent overwriting existing checklists. Conduct regular audits of checklist data integrity and review user permissions to minimize the risk of insider exploitation. Finally, educate users about the risks of credential compromise and enforce strong authentication mechanisms such as multi-factor authentication to reduce the likelihood of unauthorized access.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2024-9000: CWE-862 Missing Authorization in lunary-ai lunary-ai/lunary
Description
In lunary-ai/lunary before version 1.4.26, the checklists.post() endpoint allows users to create or modify checklists without validating whether the user has proper permissions. This missing access control permits unauthorized users to create checklists, bypassing intended permission checks. Additionally, the endpoint does not validate the uniqueness of the slug field when creating a new checklist, allowing an attacker to spoof existing checklists by reusing the slug of an already-existing checklist. This can lead to significant data integrity issues, as legitimate checklists can be replaced with malicious or altered data.
AI-Powered Analysis
Technical Analysis
CVE-2024-9000 is a vulnerability identified in the lunary-ai/lunary software before version 1.4.26, specifically affecting the checklists.post() endpoint. This endpoint is responsible for creating or modifying checklist entries within the application. The core issue is a missing authorization check (CWE-862), meaning the system does not verify whether the user making the request has the appropriate permissions to perform these actions. Consequently, any authenticated user with access to this endpoint can create or modify checklists regardless of their privileges. Furthermore, the endpoint does not enforce uniqueness on the 'slug' field, which is presumably used as a unique identifier or URL-friendly key for checklists. Attackers can exploit this by reusing the slug of an existing checklist to overwrite or spoof legitimate entries, leading to data integrity violations. The vulnerability has a CVSS v3.0 base score of 7.1, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requires privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), low confidentiality impact (C:L), high integrity impact (I:H), and no availability impact (A:N). This means an attacker with some level of authenticated access can remotely exploit this vulnerability without user interaction, potentially altering critical checklist data. No public exploits have been reported yet, but the vulnerability poses a significant risk to data integrity and trustworthiness of checklist data within affected deployments.
Potential Impact
For European organizations, the impact of CVE-2024-9000 can be substantial, especially for those relying on lunary-ai/lunary for operational workflows, project management, or compliance tracking. Unauthorized creation or modification of checklists can lead to misinformation, disruption of business processes, and potential compliance violations if checklists are used for audit or regulatory purposes. The ability to spoof existing checklists by slug reuse further exacerbates the risk by allowing attackers to replace legitimate data with malicious or misleading content, undermining data integrity and trust. This could result in erroneous decision-making, operational delays, or exposure to further attacks if malicious data is used as a vector. While the vulnerability requires some level of authentication, insider threats or compromised accounts could easily exploit it. The absence of availability impact reduces the risk of denial-of-service, but the integrity compromise alone is critical. Organizations in sectors such as finance, healthcare, manufacturing, and government—where checklist accuracy is vital—are particularly at risk.
Mitigation Recommendations
To mitigate CVE-2024-9000, organizations should immediately upgrade lunary-ai/lunary to version 1.4.26 or later where the vulnerability is patched. If upgrading is not immediately feasible, implement strict access controls to limit who can authenticate and access the checklists.post() endpoint, ideally restricting it to trusted administrators or service accounts. Employ application-layer firewalls or API gateways to monitor and block unauthorized modification attempts. Implement logging and alerting on checklist creation and modification activities to detect suspicious behavior. Additionally, validate and enforce uniqueness of the slug field at the application or database level to prevent overwriting existing checklists. Conduct regular audits of checklist data integrity and review user permissions to minimize the risk of insider exploitation. Finally, educate users about the risks of credential compromise and enforce strong authentication mechanisms such as multi-factor authentication to reduce the likelihood of unauthorized access.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-09-19T14:18:52.464Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b2e178f764e1f470e9d
Added to database: 10/15/2025, 1:01:34 PM
Last enriched: 10/15/2025, 1:08:30 PM
Last updated: 12/3/2025, 6:02:02 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64443: CWE-749: Exposed Dangerous Method or Function in docker mcp-gateway
HighCVE-2025-54326: n/a
UnknownCVE-2025-53965: n/a
UnknownCVE-2024-44373: n/a
CriticalCVE-2025-65842: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.