CVE-2025-9803: CWE-287 Improper Authentication in lunary-ai lunary-ai/lunary
lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensuring the token is intended for the application. This oversight allows attackers to use tokens issued to malicious applications to gain unauthorized access to user accounts. The issue is resolved in version 1.9.35.
AI Analysis
Technical Summary
CVE-2025-9803 identifies a critical improper authentication vulnerability (CWE-287) in lunary-ai/lunary version 1.9.34 related to its integration with Google OAuth. The core issue is the application's failure to verify the 'aud' (audience) claim within the OAuth access token issued by Google. The 'aud' claim is a security control that ensures the token was issued specifically for the intended recipient application. By neglecting this verification, lunary-ai/lunary accepts tokens issued to other applications, including potentially malicious ones. An attacker can exploit this by obtaining a valid access token from Google for a malicious app and presenting it to lunary-ai/lunary, which erroneously accepts it as valid. This leads to unauthorized access and full account takeover of legitimate users without needing prior credentials or elevated privileges. The vulnerability has a CVSS 3.0 base score of 9.3 (critical), reflecting its network attack vector, low complexity, no privileges required, and user interaction limited to token presentation. The scope is changed because the attacker can access resources beyond their original permissions. Confidentiality and integrity are fully compromised, while availability remains unaffected. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make exploitation highly feasible. The issue is fixed in lunary-ai/lunary version 1.9.35 by implementing proper validation of the 'aud' claim in OAuth tokens, ensuring tokens are accepted only if intended for the lunary-ai application.
Potential Impact
For European organizations using lunary-ai/lunary, especially those leveraging Google OAuth for authentication, this vulnerability poses a significant risk of unauthorized account takeover. Attackers can impersonate legitimate users, gaining access to sensitive data, internal communications, or proprietary resources managed within lunary-ai/lunary. This compromises confidentiality and integrity of organizational data and user accounts. The attack requires no prior authentication and minimal user interaction, increasing the likelihood of successful exploitation. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, face heightened regulatory and reputational risks. Additionally, compromised accounts could be leveraged for lateral movement or further attacks within the enterprise environment. The lack of availability impact means systems remain operational, potentially masking the breach and delaying detection. Given the widespread use of OAuth and cloud-based SaaS tools in Europe, the vulnerability could affect a broad range of organizations, amplifying its potential impact.
Mitigation Recommendations
1. Immediately upgrade lunary-ai/lunary to version 1.9.35 or later, which includes the fix for proper 'aud' claim validation in OAuth tokens. 2. Conduct a thorough audit of OAuth token validation logic in all integrated applications to ensure strict verification of token claims, especially the 'aud' field. 3. Implement monitoring and alerting for anomalous login patterns or token usage that may indicate exploitation attempts. 4. Educate users about phishing and social engineering risks that could facilitate token theft or misuse. 5. Review and enforce least privilege principles for OAuth scopes and permissions granted to applications. 6. Consider deploying additional identity and access management controls such as multi-factor authentication (MFA) to reduce risk from compromised tokens. 7. Maintain an incident response plan tailored to OAuth-related account compromises to enable rapid containment and remediation. 8. Collaborate with Google OAuth support and security teams for updates or advisories related to token issuance and validation best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-9803: CWE-287 Improper Authentication in lunary-ai lunary-ai/lunary
Description
lunary-ai/lunary version 1.9.34 is vulnerable to an account takeover due to improper authentication in the Google OAuth integration. The application fails to verify the 'aud' (audience) field in the access token issued by Google, which is crucial for ensuring the token is intended for the application. This oversight allows attackers to use tokens issued to malicious applications to gain unauthorized access to user accounts. The issue is resolved in version 1.9.35.
AI-Powered Analysis
Technical Analysis
CVE-2025-9803 identifies a critical improper authentication vulnerability (CWE-287) in lunary-ai/lunary version 1.9.34 related to its integration with Google OAuth. The core issue is the application's failure to verify the 'aud' (audience) claim within the OAuth access token issued by Google. The 'aud' claim is a security control that ensures the token was issued specifically for the intended recipient application. By neglecting this verification, lunary-ai/lunary accepts tokens issued to other applications, including potentially malicious ones. An attacker can exploit this by obtaining a valid access token from Google for a malicious app and presenting it to lunary-ai/lunary, which erroneously accepts it as valid. This leads to unauthorized access and full account takeover of legitimate users without needing prior credentials or elevated privileges. The vulnerability has a CVSS 3.0 base score of 9.3 (critical), reflecting its network attack vector, low complexity, no privileges required, and user interaction limited to token presentation. The scope is changed because the attacker can access resources beyond their original permissions. Confidentiality and integrity are fully compromised, while availability remains unaffected. Although no known exploits are currently reported in the wild, the vulnerability's nature and severity make exploitation highly feasible. The issue is fixed in lunary-ai/lunary version 1.9.35 by implementing proper validation of the 'aud' claim in OAuth tokens, ensuring tokens are accepted only if intended for the lunary-ai application.
Potential Impact
For European organizations using lunary-ai/lunary, especially those leveraging Google OAuth for authentication, this vulnerability poses a significant risk of unauthorized account takeover. Attackers can impersonate legitimate users, gaining access to sensitive data, internal communications, or proprietary resources managed within lunary-ai/lunary. This compromises confidentiality and integrity of organizational data and user accounts. The attack requires no prior authentication and minimal user interaction, increasing the likelihood of successful exploitation. Organizations in sectors with strict data protection requirements, such as finance, healthcare, and government, face heightened regulatory and reputational risks. Additionally, compromised accounts could be leveraged for lateral movement or further attacks within the enterprise environment. The lack of availability impact means systems remain operational, potentially masking the breach and delaying detection. Given the widespread use of OAuth and cloud-based SaaS tools in Europe, the vulnerability could affect a broad range of organizations, amplifying its potential impact.
Mitigation Recommendations
1. Immediately upgrade lunary-ai/lunary to version 1.9.35 or later, which includes the fix for proper 'aud' claim validation in OAuth tokens. 2. Conduct a thorough audit of OAuth token validation logic in all integrated applications to ensure strict verification of token claims, especially the 'aud' field. 3. Implement monitoring and alerting for anomalous login patterns or token usage that may indicate exploitation attempts. 4. Educate users about phishing and social engineering risks that could facilitate token theft or misuse. 5. Review and enforce least privilege principles for OAuth scopes and permissions granted to applications. 6. Consider deploying additional identity and access management controls such as multi-factor authentication (MFA) to reduce risk from compromised tokens. 7. Maintain an incident response plan tailored to OAuth-related account compromises to enable rapid containment and remediation. 8. Collaborate with Google OAuth support and security teams for updates or advisories related to token issuance and validation best practices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2025-09-01T13:06:49.733Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 6924fa182a08b12b0e784284
Added to database: 11/25/2025, 12:36:40 AM
Last enriched: 11/25/2025, 12:51:14 AM
Last updated: 11/25/2025, 2:40:40 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59373: CWE-732 Incorrect Permission Assignment for Critical Resource in ASUS MyASUS
HighCVE-2023-41419: n/a
UnknownCVE-2025-65951: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in mescuwa entropy-derby
HighCVE-2025-65944: CWE-201: Insertion of Sensitive Information Into Sent Data in getsentry sentry-javascript
MediumCVE-2025-65018: CWE-787: Out-of-bounds Write in pnggroup libpng
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.