CVE-2026-3693: Improper Control of Resource Identifiers in Shy2593666979 AgentChat
A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_user_info/update_user_info of the file /src/backend/agentchat/api/v1/user.py of the component User Endpoint. This manipulation of the argument user_id causes improper control of resource identifiers. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-3693 is a vulnerability affecting the Shy2593666979 AgentChat product, specifically versions 2.0 through 2.3.0. The flaw resides in the User Endpoint component, within the functions get_user_info and update_user_info located in /src/backend/agentchat/api/v1/user.py. The vulnerability arises from improper control of resource identifiers, where the user_id parameter can be manipulated by an attacker. This improper validation allows an unauthenticated remote attacker to potentially access or modify user information that they should not have permission to interact with. The vulnerability does not require any privileges or user interaction, making it easier to exploit. The CVSS v4.0 score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vendor was notified early but has not responded or issued a patch. Exploit code has been published, increasing the risk of exploitation. No known active exploitation has been reported yet. The vulnerability could lead to unauthorized disclosure or modification of user data, undermining trust and potentially enabling further attacks within affected environments.
Potential Impact
The vulnerability allows remote attackers to manipulate user identifiers without authentication, potentially leading to unauthorized access to sensitive user information or unauthorized modification of user data. This can compromise confidentiality and integrity of user records managed by AgentChat. For organizations relying on AgentChat for communication or customer interaction, this could result in data breaches, privacy violations, and loss of customer trust. Attackers could leverage this flaw to escalate privileges or pivot to other parts of the network if user data includes sensitive or administrative information. The absence of vendor response and patches increases the window of exposure. Although availability impact is limited, the integrity and confidentiality risks are significant enough to warrant immediate attention. The published exploit code raises the likelihood of exploitation attempts, especially in environments with internet-facing AgentChat deployments.
Mitigation Recommendations
Since no official patch is available, organizations should implement compensating controls immediately. These include restricting network access to the AgentChat User Endpoint to trusted internal networks or VPNs, employing web application firewalls (WAFs) to detect and block suspicious requests manipulating user_id parameters, and monitoring logs for anomalous access patterns targeting user endpoints. Conduct thorough access reviews and limit permissions to the minimum necessary for AgentChat users. If possible, implement input validation or parameter filtering at a proxy or API gateway level to prevent unauthorized user_id manipulation. Organizations should also prepare to apply vendor patches promptly once released and consider upgrading to newer, unaffected versions if available. Regularly audit user data integrity and monitor for unauthorized changes. Finally, maintain incident response readiness to quickly address any exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, South Korea, India, Brazil
CVE-2026-3693: Improper Control of Resource Identifiers in Shy2593666979 AgentChat
Description
A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_user_info/update_user_info of the file /src/backend/agentchat/api/v1/user.py of the component User Endpoint. This manipulation of the argument user_id causes improper control of resource identifiers. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2026-3693 is a vulnerability affecting the Shy2593666979 AgentChat product, specifically versions 2.0 through 2.3.0. The flaw resides in the User Endpoint component, within the functions get_user_info and update_user_info located in /src/backend/agentchat/api/v1/user.py. The vulnerability arises from improper control of resource identifiers, where the user_id parameter can be manipulated by an attacker. This improper validation allows an unauthenticated remote attacker to potentially access or modify user information that they should not have permission to interact with. The vulnerability does not require any privileges or user interaction, making it easier to exploit. The CVSS v4.0 score is 6.9 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. The vendor was notified early but has not responded or issued a patch. Exploit code has been published, increasing the risk of exploitation. No known active exploitation has been reported yet. The vulnerability could lead to unauthorized disclosure or modification of user data, undermining trust and potentially enabling further attacks within affected environments.
Potential Impact
The vulnerability allows remote attackers to manipulate user identifiers without authentication, potentially leading to unauthorized access to sensitive user information or unauthorized modification of user data. This can compromise confidentiality and integrity of user records managed by AgentChat. For organizations relying on AgentChat for communication or customer interaction, this could result in data breaches, privacy violations, and loss of customer trust. Attackers could leverage this flaw to escalate privileges or pivot to other parts of the network if user data includes sensitive or administrative information. The absence of vendor response and patches increases the window of exposure. Although availability impact is limited, the integrity and confidentiality risks are significant enough to warrant immediate attention. The published exploit code raises the likelihood of exploitation attempts, especially in environments with internet-facing AgentChat deployments.
Mitigation Recommendations
Since no official patch is available, organizations should implement compensating controls immediately. These include restricting network access to the AgentChat User Endpoint to trusted internal networks or VPNs, employing web application firewalls (WAFs) to detect and block suspicious requests manipulating user_id parameters, and monitoring logs for anomalous access patterns targeting user endpoints. Conduct thorough access reviews and limit permissions to the minimum necessary for AgentChat users. If possible, implement input validation or parameter filtering at a proxy or API gateway level to prevent unauthorized user_id manipulation. Organizations should also prepare to apply vendor patches promptly once released and consider upgrading to newer, unaffected versions if available. Regularly audit user data integrity and monitor for unauthorized changes. Finally, maintain incident response readiness to quickly address any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-03-07T08:35:06.733Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69acc85d2904315ca3180bc9
Added to database: 3/8/2026, 12:52:45 AM
Last enriched: 3/8/2026, 1:07:30 AM
Last updated: 3/8/2026, 3:22:33 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.