lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions.
References
| Link | Resource |
|---|---|
| https://github.com/lunary-ai/lunary/commit/18750294a76ff6c0f3f1b6af4ac1a23399836b16 | Patch |
| https://huntr.com/bounties/c603b64e-5171-4eed-8983-a7f656ce2c4d | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-07-07 10:15
Updated : 2025-12-03 20:33
NVD link : CVE-2025-4779
Mitre link : CVE-2025-4779
CVE.ORG link : CVE-2025-4779
JSON object : View
Products Affected
lunary
- lunary
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
