Vulnerability Description
A stored cross-site scripting (XSS) vulnerability exists in lunary-ai/lunary versions 1.6.7 and earlier. An attacker can inject malicious JavaScript into the SAML IdP XML metadata, which is used to generate the SAML login redirect URL. This URL is then set as the value of `window.location.href` without proper validation or sanitization. This vulnerability allows the attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions. The issue is fixed in version 1.7.10.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lunary | Lunary | < 1.7.10 |
Related Weaknesses (CWE)
References
- https://github.com/lunary-ai/lunary/commit/fa0fd7742ae029ed934690d282519263f5d83Patch
- https://huntr.com/bounties/b3f4a655-5b08-4fef-be2c-aac8703ad5d0ExploitThird Party Advisory
FAQ
What is CVE-2025-0281?
CVE-2025-0281 is a vulnerability with a CVSS score of 5.4 (MEDIUM). A stored cross-site scripting (XSS) vulnerability exists in lunary-ai/lunary versions 1.6.7 and earlier. An attacker can inject malicious JavaScript into the SAML IdP XML metadata, which is used to ge...
How severe is CVE-2025-0281?
CVE-2025-0281 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-0281?
Check the references section above for vendor advisories and patch information. Affected products include: Lunary Lunary.