Suno.com Security Fiasco: High-Severity Vulnerabilities Exposed!
Security Advisory: Multiple high-severity vulnerabilities have been found in Suno.com, including JWT leakage, IDOR, and DoS. Notably, your session token might be easier to steal than candy from a baby. Suno.com has responded with the speed of a sloth, prompting public disclosure to protect users.

Hot Take:
In a shocking twist of fate, Suno.com seems to have transformed from a web application into a cybercriminal’s paradise, offering a buffet of vulnerabilities for hackers to feast on. If Suno were a piñata, it would be raining down JWT tokens and user data faster than you can say ‘Oops, we did it again!’
Key Points:
- Multiple high-severity vulnerabilities discovered in Suno.com.
- Excessive data exposure includes JWT token leakage.
- Broken object level authorization allows unauthorized data access.
- Unrestricted resource consumption could lead to denial of service.
- Vendor’s response was lackluster, leading to public disclosure.
Already a member? Log in here
