Information Disclosure in lunary-ai/lunary
Description
An information disclosure vulnerability exists in the lunary-ai/lunary, specifically in the runs/{run_id}/related endpoint. This endpoint does not verify that the user has the necessary access rights to the run(s) they are accessing. As a result, it returns not only the specified run but also all runs that have the run_id listed as their parent run. This issue affects the main branch, commit a761d833. The vulnerability allows unauthorized users to obtain information about non-public runs and their related runs, given the run_id of a public or non-public run.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Lunary's runs/{run_id}/related endpoint lacks access control, allowing unauthorized users to view non-public runs and their parent-child relationships.
Vulnerability
Details
The endpoint runs/{run_id}/related in lunary-ai/lunary fails to verify that the requesting user has the necessary access rights to the run(s) they are querying. This access control omission means that any user, regardless of their authorization level, can retrieve information about any run provided they know its run_id. The vulnerability affects the main branch at commit a761d833 [1].
Exploitation
An attacker can exploit this vulnerability by sending a request to the /runs/{run_id}/related endpoint with a known run_id, which could be obtained from a public run or guessed. The endpoint not only returns the specified run but also all runs that have that run_id listed as their parent run. This allows the attacker to traverse the run hierarchy and gather information about related non-public runs without proper authorization [1]. The vulnerability was reported via the Huntr bug bounty platform [2].
Impact
Successful exploitation leads to unauthorized information disclosure of non-public runs and their relationships. This could expose sensitive data, internal processes, or business logic that are intended to be restricted to specific users or roles.
Mitigation
As of the publication date, the vulnerability remains unpatched in the main branch. Users of lunary-ai/lunary should implement proper access control checks on the runs/{run_id}/related endpoint to ensure that only authorized users can access runs and their related runs. The specific vulnerable commit is a761d833 [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
lunarynpm | < 1.4.10 | 1.4.10 |
Affected products
2- lunary-ai/lunary-ai/lunaryv5Range: unspecified
Patches
135afd4439464Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4News mentions
0No linked articles in our index yet.