Broken Access Control in lunary-ai/lunary
Description
A broken access control vulnerability exists in the latest version of lunary-ai/lunary. The saml.ts file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and potential account takeover if the email of a user in the target organization is known.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2024-6582 lets users in one organization modify the SAML IDP settings and view SSO metadata of another organization, risking unauthorized access.
Vulnerability
Overview CVE-2024-6582 is a broken access control vulnerability in lunary-ai/lunary, an open-source AI tool. The flaw resides in the saml.ts file, where the authorization mechanism fails to properly verify that a user belongs to the organization whose Identity Provider (IDP) settings or SSO metadata they are modifying or viewing [1]. Lacking proper tenant scoping, any authenticated user can target an arbitrary organization's SAML configuration.
Exploitation
An attacker must be an authenticated user within the lunary application. No special privileges are required beyond being logged in. By crafting requests to the affected endpoint, an attacker can update the IDP settings—such as certificate or SSO URL—and read the SSO metadata of another organization if they know the target organization's identifier [1]. This can be performed without any interaction from the victim organization's users.
Impact
Successful exploitation allows the attacker to alter the SAML authentication flow for the target organization. By modifying IDP settings, the attacker can redirect users to a malicious identity provider or disable security checks. If combined with knowledge of a target user's email address, this can lead to account takeover because the attacker could authenticate as that user via the compromised SSO [1]. This undermines trust within multi-tenant deployments.
Mitigation
As of the publication date (2024-09-13) there is no confirmed patch for CVE-2024-6582. The vulnerability was reported via the Huntr bounty program, and users should monitor the lunary repository for patches or implement strict tenant isolation controls [2]. No workaround is currently documented.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lunarynpm | < 1.4.9 | 1.4.9 |
Affected products
2- lunary-ai/lunary-ai/lunaryv5Range: unspecified
Patches
11f043d8798adVulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.