lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 07 Jul 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | lunary-ai/lunary versions prior to 1.9.24 are vulnerable to stored cross-site scripting (XSS). An unauthenticated attacker can inject malicious JavaScript into the `v1/runs/ingest` endpoint by adding an empty `citations` field, triggering a code path where `dangerouslySetInnerHTML` is used to render attacker-controlled text. This vulnerability allows the execution of arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions. | |
Title | Stored Cross-site Scripting (XSS) in lunary-ai/lunary | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published: 2025-07-07T09:53:10.901Z
Updated: 2025-07-07T17:24:24.732Z
Reserved: 2025-05-15T14:03:54.703Z
Link: CVE-2025-4779

Updated: 2025-07-07T17:24:08.785Z

Status : Received
Published: 2025-07-07T10:15:28.717
Modified: 2025-07-07T10:15:28.717
Link: CVE-2025-4779

No data.