{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T20:57:39.361","vulnerabilities":[{"cve":{"id":"CVE-2024-10275","sourceIdentifier":"security@huntr.dev","published":"2025-03-20T10:15:16.107","lastModified":"2025-10-15T13:15:35.130","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In version 1.5.5 of lunary-ai/lunary, a vulnerability exists where admins, who do not have direct permissions to access billing resources, can change the permissions of existing users to include billing permissions. This can lead to a privilege escalation scenario where an administrator can manage billing, effectively bypassing the intended role-based access control. Only users with the 'owner' role should be allowed to invite members with billing permissions. This flaw allows admins to circumvent those restrictions, gaining unauthorized access and control over billing information, posing a risk to the organization’s financial resources."},{"lang":"es","value":"En la versión 1.5.5 de lunary-ai/lunary, existe una vulnerabilidad que permite a los administradores, sin permisos directos para acceder a los recursos de facturación, modificar los permisos de los usuarios existentes para incluirlos. Esto puede dar lugar a una escalada de privilegios donde un administrador puede gestionar la facturación, omitiendo así el control de acceso basado en roles. Solo los usuarios con el rol de \"propietario\" deberían poder invitar a miembros con permisos de facturación. Esta falla permite a los administradores eludir estas restricciones, obteniendo acceso y control no autorizados sobre la información de facturación, lo que supone un riesgo para los recursos financieros de la organización."}],"metrics":{"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":5.2}]},"weaknesses":[{"source":"security@huntr.dev","type":"Secondary","description":[{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.7","matchCriteriaId":"276ACF5E-F541-4943-BB3C-8FC124FDE9F5"}]}]}],"references":[{"url":"https://github.com/lunary-ai/lunary/commit/8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc","source":"security@huntr.dev","tags":["Patch"]},{"url":"https://huntr.com/bounties/863ee34b-c4c6-4325-bf7a-82a7feebf88f","source":"security@huntr.dev","tags":["Exploit","Third Party Advisory"]}]}}]}