{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:18:49.965","vulnerabilities":[{"cve":{"id":"CVE-2024-4147","sourceIdentifier":"security@huntr.dev","published":"2026-02-02T11:16:16.443","lastModified":"2026-02-11T21:14:06.077","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In lunary-ai/lunary version 1.2.13, an insufficient granularity of access control vulnerability allows users to delete prompts created in other organizations through ID manipulation. The vulnerability stems from the application's failure to validate the ownership of the prompt before deletion, only checking if the user has permissions to delete such resources without verifying if it belongs to the user's project or organization. As a result, users can remove prompts not owned by their organization or project, leading to legitimate users being unable to access the removed prompts and causing information inconsistencies."},{"lang":"es","value":"En la versión 1.2.13 de lunary-ai/lunary, una vulnerabilidad de granularidad insuficiente en el control de acceso permite a los usuarios eliminar prompts creados en otras organizaciones mediante la manipulación de ID. La vulnerabilidad se origina en la falta de validación por parte de la aplicación de la propiedad del prompt antes de la eliminación, solo verificando si el usuario tiene permisos para eliminar dichos recursos sin verificar si pertenece al proyecto u organización del usuario. Como resultado, los usuarios pueden eliminar prompts que no son propiedad de su organización o proyecto, lo que lleva a que usuarios legítimos no puedan acceder a los prompts eliminados y causando inconsistencias en la información."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":2.5}],"cvssMetricV30":[{"source":"security@huntr.dev","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@huntr.dev","type":"Primary","description":[{"lang":"en","value":"CWE-1220"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*","versionEndExcluding":"1.2.25","matchCriteriaId":"84358D2A-36D0-4D73-8ED6-AAE4229717CB"}]}]}],"references":[{"url":"https://github.com/lunary-ai/lunary/commit/0755dde1afc2a74ec23b55eee03e4416916cf48f","source":"security@huntr.dev","tags":["Broken Link"]},{"url":"https://huntr.com/bounties/3f051943-71ea-414c-a528-cd8b5d82a7ad","source":"security@huntr.dev","tags":["Exploit","Patch","Third Party Advisory"]}]}}]}