CVE-2024-5386

In lunary-ai/lunary version 1.2.2, an account hijacking vulnerability exists due to a password reset token leak. A user with a 'viewer' role can exploit this vulnerability to hijack another user's account by obtaining the password reset token. The vulnerability is triggered when the 'viewer' role user sends a specific request to the server, which responds with a password reset token in the 'recoveryToken' parameter. This token can then be used to reset the password of another user's account without authorization. The issue results from an excessive attack surface, allowing lower-privileged users to escalate their privileges and take over accounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

History

11 Feb 2026, 21:03

Type Values Removed Values Added
References () https://github.com/lunary-ai/lunary/commit/fc7ab3d5621c18992da5dab3a2a9a8d227d42311 - () https://github.com/lunary-ai/lunary/commit/fc7ab3d5621c18992da5dab3a2a9a8d227d42311 - Broken Link
References () https://huntr.com/bounties/602eb4a1-305d-46d6-b975-5a5d8b040ad1 - () https://huntr.com/bounties/602eb4a1-305d-46d6-b975-5a5d8b040ad1 - Exploit, Patch, Third Party Advisory
First Time Lunary lunary
Lunary
CVSS v2 : unknown
v3 : 9.6
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*

02 Feb 2026, 11:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-02 11:16

Updated : 2026-02-11 21:03


NVD link : CVE-2024-5386

Mitre link : CVE-2024-5386

CVE.ORG link : CVE-2024-5386


JSON object : View

Products Affected

lunary

  • lunary
CWE
CWE-1125

Excessive Attack Surface