Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9803: CWE-287 Improper Authentication in lunary-ai lunary-ai/lunary

0
Critical
VulnerabilityCVE-2025-9803cvecve-2025-9803cwe-287
Published: Tue Nov 25 2025 (11/25/2025, 00:00:35 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensuring the token is intended for the application. This oversight allows attackers to use tokens issued to malicious applications to gain unauthorized access to user accounts. The issue is resolved in version 1.9.35.

AI-Powered Analysis

AILast updated: 12/02/2025, 04:24:51 UTC

Technical Analysis

CVE-2025-9803 is a critical security vulnerability classified under CWE-287 (Improper Authentication) affecting lunary-ai/lunary version 1.9.34. The root cause is the application's failure to verify the 'aud' (audience) claim in the Google OAuth access token. The 'aud' field is essential to confirm that the token was issued specifically for the lunary-ai application. Without this verification, an attacker can present a valid access token issued to a malicious or different application and gain unauthorized access to user accounts within lunary-ai. This bypasses the intended authentication mechanism, effectively allowing account takeover. The vulnerability requires no privileges and only user interaction during the OAuth login process, making exploitation feasible in targeted phishing or social engineering attacks. The CVSS v3.0 score is 9.3 (critical), reflecting the high impact on confidentiality and integrity, with no impact on availability. The scope is changed (S:C) because the attacker can access other users' accounts. The issue is resolved in lunary-ai/lunary version 1.9.35 by implementing proper validation of the 'aud' claim in OAuth tokens. No known exploits are reported in the wild yet, but the high severity and ease of exploitation make prompt remediation essential.

Potential Impact

For European organizations, this vulnerability poses a significant risk to user account security and data confidentiality. Organizations relying on lunary-ai/lunary for critical business functions or sensitive data management could face unauthorized data access, leading to data breaches, loss of intellectual property, and reputational damage. The improper authentication flaw undermines trust in OAuth-based single sign-on, potentially exposing users to account takeover through token misuse. Attackers could impersonate legitimate users, access confidential communications, or manipulate data, impacting business operations and compliance with GDPR and other data protection regulations. The lack of availability impact means service disruption is unlikely, but the confidentiality and integrity risks are severe. Organizations with extensive cloud integration and Google OAuth usage are particularly vulnerable.

Mitigation Recommendations

The primary mitigation is to upgrade lunary-ai/lunary to version 1.9.35 or later, where the 'aud' claim verification is correctly implemented. Organizations should audit their OAuth token validation processes to ensure all tokens are verified against the expected audience and issuer fields. Implement additional monitoring for anomalous login patterns and token usage to detect potential misuse. Employ multi-factor authentication (MFA) to reduce the risk of account takeover even if token validation is bypassed. Educate users about phishing risks associated with OAuth login flows. For environments where immediate upgrade is not possible, consider disabling Google OAuth login temporarily or restricting access to trusted IP ranges. Regularly review OAuth client configurations and permissions to minimize attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-09-01T13:06:49.733Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6924fa182a08b12b0e784284

Added to database: 11/25/2025, 12:36:40 AM

Last enriched: 12/2/2025, 4:24:51 AM

Last updated: 1/9/2026, 4:50:53 AM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats