Cyber Posture

CVE-2024-8998

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
04 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0036 58.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-8998 is a high-severity Inefficient Regular Expression Complexity (CWE-1333) vulnerability in Lunary Lunary. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 41.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Other Platforms; in the Other ATLAS/OWASP Terms risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the ReDoS vulnerability by requiring timely remediation through patching to the fixed version 1.4.26.

prevent

Requires validation of user-controlled inputs to reject or sanitize crafted strings that trigger polynomial-time backtracking in the vulnerable regex /{.*?}/.

prevent

Implements denial-of-service protections such as request timeouts or resource limits to prevent server hangs from ReDoS exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

ReDoS vulnerability enables crafted input to trigger polynomial-time regex matching, causing server CPU exhaustion and hang, facilitating application exploitation for endpoint DoS.

NVD Description

A Regular Expression Denial of Service (ReDoS) vulnerability exists in lunary-ai/lunary version git f07a845. The server uses the regex /{.*?}/ to match user-controlled strings. In the default JavaScript regex engine, this regex can take polynomial time to match certain crafted…

more

user inputs. As a result, an attacker can cause the server to hang for an arbitrary amount of time by submitting a specially crafted payload. This issue is fixed in version 1.4.26.

Deeper analysisAI

CVE-2024-8998 is a Regular Expression Denial of Service (ReDoS) vulnerability in the lunary-ai/lunary server at commit git f07a845. The issue stems from the regex pattern /{.*?}/ applied to user-controlled strings, which exhibits polynomial-time complexity in the default JavaScript regex engine when processing certain crafted inputs. This affects the server's ability to process requests efficiently, as rated by a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) and mapped to CWE-1333.

Any unauthenticated remote attacker can exploit this vulnerability by submitting a specially crafted payload that triggers excessive backtracking in the regex engine. Successful exploitation causes the server to hang for an arbitrary duration, resulting in a denial of service that impacts availability without requiring privileges or user interaction.

The vulnerability is fixed in lunary-ai/lunary version 1.4.26, as detailed in the patching commit at https://github.com/lunary-ai/lunary/commit/f2bfa036caf2c48686474f4560a9c5abcf5f43b7. Additional details are available via the Huntr advisory at https://huntr.com/bounties/4dbd8648-1dca-4f95-b74f-978ef030e97e. Security practitioners should upgrade to the patched version and review regex usage in Node.js applications for similar ReDoS risks.

Details

CWE(s)

Affected Products

lunary
lunary
≤ 1.4.26

AI Security AnalysisAI

AI Category
Other Platforms
Risk Domain
Other ATLAS/OWASP Terms
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Lunary-ai/lunary is an open-source observability and evaluation platform for AI/LLM applications, fitting as an 'Other Platforms' category for AI infrastructure tools.

CVEs Like This One

CVE-2025-5352Same product: Lunary Lunary
CVE-2024-8999Same product: Lunary Lunary
CVE-2024-9095Same product: Lunary Lunary
CVE-2024-5386Same product: Lunary Lunary
CVE-2024-9096Same product: Lunary Lunary
CVE-2025-9803Same product: Lunary Lunary
CVE-2024-9099Same product: Lunary Lunary
CVE-2024-12720Shared CWE-1333
CVE-2025-70030Shared CWE-1333
CVE-2026-28356Shared CWE-1333

References