In lunary-ai/lunary version 1.2.2, an account hijacking vulnerability exists due to a password reset token leak. A user with a 'viewer' role can exploit this vulnerability to hijack another user's account by obtaining the password reset token. The vulnerability is triggered when the 'viewer' role user sends a specific request to the server, which responds with a password reset token in the 'recoveryToken' parameter. This token can then be used to reset the password of another user's account without authorization. The issue results from an excessive attack surface, allowing lower-privileged users to escalate their privileges and take over accounts.
References
| Link | Resource |
|---|---|
| https://github.com/lunary-ai/lunary/commit/fc7ab3d5621c18992da5dab3a2a9a8d227d42311 | Broken Link |
| https://huntr.com/bounties/602eb4a1-305d-46d6-b975-5a5d8b040ad1 | Exploit Patch Third Party Advisory |
Configurations
History
11 Feb 2026, 21:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/lunary-ai/lunary/commit/fc7ab3d5621c18992da5dab3a2a9a8d227d42311 - Broken Link | |
| References | () https://huntr.com/bounties/602eb4a1-305d-46d6-b975-5a5d8b040ad1 - Exploit, Patch, Third Party Advisory | |
| First Time |
Lunary lunary
Lunary |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:* |
02 Feb 2026, 11:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 11:16
Updated : 2026-02-11 21:03
NVD link : CVE-2024-5386
Mitre link : CVE-2024-5386
CVE.ORG link : CVE-2024-5386
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-1125
Excessive Attack Surface
