CVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
An Insecure Direct Object Reference (IDOR) vulnerability was identified in the `POST /v1/templates` endpoint of the Lunary API, affecting versions up to 0.8.8. This vulnerability allows authenticated users to create templates in another user's project by altering the `projectId` query parameter. The root cause of this issue is the absence of server-side validation to ensure that the authenticated user owns the specified `projectId`. The vulnerability has been addressed in version 1.9.23.
AI Analysis
Technical Summary
CVE-2025-4962 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) affecting the lunary-ai/lunary product, specifically versions up to 0.8.8. The vulnerability resides in the API endpoint `POST /v1/templates`, where authenticated users can create templates within projects they do not own by manipulating the `projectId` query parameter. This is a classic Insecure Direct Object Reference (IDOR) flaw, where the server fails to verify ownership or authorization of the resource referenced by the user-supplied identifier. The root cause is the lack of server-side validation to confirm that the authenticated user has rights over the specified `projectId`. Because of this, an attacker with valid credentials can escalate privileges within the application by injecting templates into other users' projects, potentially disrupting workflows or injecting malicious content. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N). The impact primarily affects the integrity of project data, as unauthorized template creation can alter project contents without detection. Confidentiality and availability are not directly impacted. The vulnerability has been fixed in version 1.9.23 of lunary-ai/lunary. No known exploits are currently reported in the wild, but the ease of exploitation and high impact on integrity make this a significant risk if left unpatched.
Potential Impact
For European organizations using lunary-ai/lunary, this vulnerability poses a significant risk to project data integrity. Unauthorized template creation could lead to data corruption, insertion of malicious templates, or disruption of legitimate workflows, potentially causing operational delays or erroneous outputs. Organizations relying on lunary for critical project management or AI template generation may face internal data integrity issues, undermining trust in the platform. Although confidentiality is not directly compromised, the ability to alter project contents without authorization can have cascading effects on decision-making and compliance, especially in regulated industries such as finance, healthcare, and government sectors prevalent in Europe. The vulnerability requires authenticated access, so insider threats or compromised credentials increase risk. Given the collaborative nature of many European enterprises and the potential for cross-team project sharing, this flaw could be exploited to affect multiple users or departments. The lack of known exploits in the wild provides a window for mitigation, but the high CVSS score indicates that exploitation could have serious consequences if attackers gain access.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary installations to version 1.9.23 or later, where the vulnerability is patched. Until upgrades are possible, implement strict access controls and monitoring on API usage, particularly the `POST /v1/templates` endpoint, to detect anomalous projectId modifications. Enforce least privilege principles to limit user permissions to only projects they own or manage. Conduct thorough audits of project ownership and template creation logs to identify unauthorized activities. Integrate multi-factor authentication (MFA) to reduce risks from compromised credentials. Additionally, implement Web Application Firewall (WAF) rules to detect and block suspicious API requests that attempt to manipulate projectId parameters. Educate users about the risks of credential sharing and monitor for insider threat indicators. Finally, coordinate with lunary-ai support for any additional security advisories and best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium
CVE-2025-4962: CWE-284 Improper Access Control in lunary-ai lunary-ai/lunary
Description
An Insecure Direct Object Reference (IDOR) vulnerability was identified in the `POST /v1/templates` endpoint of the Lunary API, affecting versions up to 0.8.8. This vulnerability allows authenticated users to create templates in another user's project by altering the `projectId` query parameter. The root cause of this issue is the absence of server-side validation to ensure that the authenticated user owns the specified `projectId`. The vulnerability has been addressed in version 1.9.23.
AI-Powered Analysis
Technical Analysis
CVE-2025-4962 is a high-severity vulnerability classified under CWE-284 (Improper Access Control) affecting the lunary-ai/lunary product, specifically versions up to 0.8.8. The vulnerability resides in the API endpoint `POST /v1/templates`, where authenticated users can create templates within projects they do not own by manipulating the `projectId` query parameter. This is a classic Insecure Direct Object Reference (IDOR) flaw, where the server fails to verify ownership or authorization of the resource referenced by the user-supplied identifier. The root cause is the lack of server-side validation to confirm that the authenticated user has rights over the specified `projectId`. Because of this, an attacker with valid credentials can escalate privileges within the application by injecting templates into other users' projects, potentially disrupting workflows or injecting malicious content. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N). The impact primarily affects the integrity of project data, as unauthorized template creation can alter project contents without detection. Confidentiality and availability are not directly impacted. The vulnerability has been fixed in version 1.9.23 of lunary-ai/lunary. No known exploits are currently reported in the wild, but the ease of exploitation and high impact on integrity make this a significant risk if left unpatched.
Potential Impact
For European organizations using lunary-ai/lunary, this vulnerability poses a significant risk to project data integrity. Unauthorized template creation could lead to data corruption, insertion of malicious templates, or disruption of legitimate workflows, potentially causing operational delays or erroneous outputs. Organizations relying on lunary for critical project management or AI template generation may face internal data integrity issues, undermining trust in the platform. Although confidentiality is not directly compromised, the ability to alter project contents without authorization can have cascading effects on decision-making and compliance, especially in regulated industries such as finance, healthcare, and government sectors prevalent in Europe. The vulnerability requires authenticated access, so insider threats or compromised credentials increase risk. Given the collaborative nature of many European enterprises and the potential for cross-team project sharing, this flaw could be exploited to affect multiple users or departments. The lack of known exploits in the wild provides a window for mitigation, but the high CVSS score indicates that exploitation could have serious consequences if attackers gain access.
Mitigation Recommendations
European organizations should immediately upgrade lunary-ai/lunary installations to version 1.9.23 or later, where the vulnerability is patched. Until upgrades are possible, implement strict access controls and monitoring on API usage, particularly the `POST /v1/templates` endpoint, to detect anomalous projectId modifications. Enforce least privilege principles to limit user permissions to only projects they own or manage. Conduct thorough audits of project ownership and template creation logs to identify unauthorized activities. Integrate multi-factor authentication (MFA) to reduce risks from compromised credentials. Additionally, implement Web Application Firewall (WAF) rules to detect and block suspicious API requests that attempt to manipulate projectId parameters. Educate users about the risks of credential sharing and monitor for insider threat indicators. Finally, coordinate with lunary-ai support for any additional security advisories and best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-05-19T17:54:23.256Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68a32efdad5a09ad00ae96f5
Added to database: 8/18/2025, 1:47:41 PM
Last enriched: 8/18/2025, 2:02:51 PM
Last updated: 8/18/2025, 3:21:30 PM
Views: 4
Related Threats
CVE-2025-55293: CWE-287: Improper Authentication in meshtastic firmware
CriticalCVE-2025-55300: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in komari-monitor komari
HighCVE-2025-55299: CWE-521: Weak Password Requirements in 7ritn VaulTLS
CriticalCVE-2025-55283: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aiven aiven-db-migrate
CriticalCVE-2025-55282: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in aiven aiven-db-migrate
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.