Cyber Posture

CVE-2024-9099

HighPublic PoC

Published: 20 March 2025

Published
20 March 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0018 39.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-9099 is a high-severity Exposure of Sensitive Information Through Metadata (CWE-1230) vulnerability in Lunary Lunary. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Steal Application Access Token (T1528); ranked at the 39.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as Enterprise AI Assistants; in the Privacy and Disclosure risk domain.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Steal Application Access Token (T1528) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations to prevent low-privilege users like Viewers from accessing sensitive private API keys via the GET /projects endpoint.

prevent

Applies least privilege to ensure minimal permission roles such as Viewer or Prompt Editor cannot retrieve private API keys.

prevent

Filters sensitive information like private API keys from API responses prior to delivery to non-privileged frontend users.

MITRE ATT&CK Enterprise TechniquesAI

T1528 Steal Application Access Token Credential Access
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
T1552 Unsecured Credentials Credential Access
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Why these techniques?

The vulnerability exposes private API keys via a GET /projects endpoint to low-privilege users (e.g., Viewers), enabling adversaries to steal application access tokens (T1528) and exploit unsecured credentials (T1552) for unauthorized actions.

NVD Description

In lunary-ai/lunary version v1.4.29, the GET /projects API endpoint exposes both public and private API keys for all projects to users with minimal permissions, such as Viewers or Prompt Editors. This vulnerability allows unauthorized users to retrieve sensitive credentials, which…

more

can be used to perform actions on behalf of the project, access private data, and delete resources. The private API keys are exposed in the developer tools when the endpoint is called from the frontend.

Deeper analysisAI

CVE-2024-9099 is a vulnerability in lunary-ai/lunary version v1.4.29, where the GET /projects API endpoint exposes both public and private API keys for all projects to users with minimal permissions, such as Viewers or Prompt Editors. The private API keys become visible in the developer tools when the endpoint is called from the frontend, enabling unauthorized access to sensitive credentials.

Attackers require only low-privilege access (PR:L), such as a Viewer or Prompt Editor role, to exploit this remotely (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N), earning a CVSS v3.1 base score of 8.1 (C:H/I:H/A:N). Successful exploitation allows retrieval of the API keys, which can then be used to perform actions on behalf of the affected project, access private data, and delete resources.

A fix is available via commit 8ba1b8ba2c2c30b1cec30eb5777c1fda670cbbfc in the lunary-ai/lunary GitHub repository. Further details on the vulnerability and remediation are provided on the Huntr bounty page at https://huntr.com/bounties/ffb84fe8-3e60-4200-ac2d-1fd1e1c93e91.

Details

CWE(s)

Affected Products

lunary
lunary
1.4.29

AI Security AnalysisAI

AI Category
Enterprise AI Assistants
Risk Domain
Privacy and Disclosure
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Lunary.ai is an LLM observability and management platform (alternative to LangSmith) for AI projects involving prompts and API keys, fitting enterprise tools for AI assistants and LLM apps.

CVEs Like This One

CVE-2025-9803Same product: Lunary Lunary
CVE-2025-5352Same product: Lunary Lunary
CVE-2024-9095Same product: Lunary Lunary
CVE-2024-8999Same product: Lunary Lunary
CVE-2024-9096Same product: Lunary Lunary
CVE-2024-5386Same product: Lunary Lunary
CVE-2024-8998Same product: Lunary Lunary

References