Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9803: CWE-287 Improper Authentication in lunary-ai lunary-ai/lunary

0
Critical
VulnerabilityCVE-2025-9803cvecve-2025-9803cwe-287
Published: Tue Nov 25 2025 (11/25/2025, 00:00:35 UTC)
Source: CVE Database V5
Vendor/Project: lunary-ai
Product: lunary-ai/lunary

Description

lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensuring the token is intended for the application. This oversight allows attackers to use tokens issued to malicious applications to gain unauthorized access to user accounts. The issue is resolved in version 1.9.35.

AI-Powered Analysis

AILast updated: 11/25/2025, 00:51:14 UTC

Technical Analysis

CVE-2025-9803 identifies a critical improper authentication vulnerability (CWE-287) in lunary-ai/lunary version 1.9.34 related to its integration with Google OAuth. The core issue is the application's failure to verify the 'aud' (audience) claim within the OAuth access token issued by Google. The 'aud' claim is a security control that ensures the token was issued specifically for the intended recipient application. By neglecting this verification, lunary-ai/lunary accepts tokens issued to other applications, including potentially malicious ones. An attacker can exploit this by obtaining a valid access token from Google for a malicious app and presenting it to lunary-ai/lunary, which erroneously accepts it as valid. This leads to unauthorized access and full account takeover of legitimate users without needing prior credentials or elevated privileges. The vulnerability has a CVSS 3.0 base score of 9.3 (critical), reflecting its network attack vector, low complexity, no privileges required, and user interaction limited to token presentation. The scope is changed because the attacker can access resources beyond their original permissions. Confidentiality and integrity are fully compromised, while availability remains unaffected. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make exploitation highly feasible. The issue is fixed in lunary-ai/lunary version 1.9.35 by implementing proper validation of the 'aud' claim in OAuth tokens, ensuring tokens are accepted only if intended for the lunary-ai application.

Potential Impact

For European organizations using lunary-ai/lunary, especially those leveraging Google OAuth for authentication, this vulnerability poses a significant risk of unauthorized account takeover. Attackers can impersonate legitimate users, gaining access to sensitive data, internal communications, or proprietary resources managed within lunary-ai/lunary. This compromises confidentiality and integrity of organizational data and user accounts. The attack requires no prior authentication and minimal user interaction, increasing the likelihood of successful exploitation. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, face heightened regulatory and reputational risks. Additionally, compromised accounts could be leveraged for lateral movement or further attacks within the enterprise environment. The lack of availability impact means systems remain operational, potentially masking the breach and delaying detection. Given the widespread use of OAuth and cloud-based SaaS tools in Europe, the vulnerability could affect a broad range of organizations, amplifying its potential impact.

Mitigation Recommendations

1. Immediately upgrade lunary-ai/lunary to version 1.9.35 or later, which includes the fix for proper 'aud' claim validation in OAuth tokens. 2. Conduct a thorough audit of OAuth token validation logic in all integrated applications to ensure strict verification of token claims, especially the 'aud' field. 3. Implement monitoring and alerting for anomalous login patterns or token usage that may indicate exploitation attempts. 4. Educate users about phishing and social engineering risks that could facilitate token theft or misuse. 5. Review and enforce least privilege principles for OAuth scopes and permissions granted to applications. 6. Consider deploying additional identity and access management controls such as multi-factor authentication (MFA) to reduce risk from compromised tokens. 7. Maintain an incident response plan tailored to OAuth-related account compromises to enable rapid containment and remediation. 8. Collaborate with Google OAuth support and security teams for updates or advisories related to token issuance and validation best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
@huntr_ai
Date Reserved
2025-09-01T13:06:49.733Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6924fa182a08b12b0e784284

Added to database: 11/25/2025, 12:36:40 AM

Last enriched: 11/25/2025, 12:51:14 AM

Last updated: 11/25/2025, 2:40:40 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats