VYPR
High severityNVD Advisory· Published Sep 13, 2024· Updated Nov 3, 2024

Broken Access Control in lunary-ai/lunary

CVE-2024-6582

Description

A broken access control vulnerability exists in the latest version of lunary-ai/lunary. The saml.ts file allows a user from one organization to update the Identity Provider (IDP) settings and view the SSO metadata of another organization. This vulnerability can lead to unauthorized access and potential account takeover if the email of a user in the target organization is known.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2024-6582 lets users in one organization modify the SAML IDP settings and view SSO metadata of another organization, risking unauthorized access.

Vulnerability

Overview CVE-2024-6582 is a broken access control vulnerability in lunary-ai/lunary, an open-source AI tool. The flaw resides in the saml.ts file, where the authorization mechanism fails to properly verify that a user belongs to the organization whose Identity Provider (IDP) settings or SSO metadata they are modifying or viewing [1]. Lacking proper tenant scoping, any authenticated user can target an arbitrary organization's SAML configuration.

Exploitation

An attacker must be an authenticated user within the lunary application. No special privileges are required beyond being logged in. By crafting requests to the affected endpoint, an attacker can update the IDP settings—such as certificate or SSO URL—and read the SSO metadata of another organization if they know the target organization's identifier [1]. This can be performed without any interaction from the victim organization's users.

Impact

Successful exploitation allows the attacker to alter the SAML authentication flow for the target organization. By modifying IDP settings, the attacker can redirect users to a malicious identity provider or disable security checks. If combined with knowledge of a target user's email address, this can lead to account takeover because the attacker could authenticate as that user via the compromised SSO [1]. This undermines trust within multi-tenant deployments.

Mitigation

As of the publication date (2024-09-13) there is no confirmed patch for CVE-2024-6582. The vulnerability was reported via the Huntr bounty program, and users should monitor the lunary repository for patches or implement strict tenant isolation controls [2]. No workaround is currently documented.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
lunarynpm
< 1.4.91.4.9

Affected products

2
  • ghsa-coords
    Range: < 1.4.9
  • lunary-ai/lunary-ai/lunaryv5
    Range: unspecified

Patches

1

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

4

News mentions

0

No linked articles in our index yet.