CVE-2026-3693

7.3 HIGH

📋 TL;DR

This vulnerability in Shy2593666979 AgentChat allows attackers to manipulate user_id parameters in user information functions, enabling unauthorized access or modification of user data. It affects AgentChat versions up to 2.3.0 and can be exploited remotely without authentication.

💻 Affected Systems

Products:
  • Shy2593666979 AgentChat
Versions: Up to and including 2.3.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the User Endpoint component specifically in the get_user_info and update_user_info functions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access, modify, or delete all user accounts and sensitive data, potentially leading to complete system compromise.

🟠

Likely Case

Unauthorized access to user information, privilege escalation, or data manipulation affecting multiple users.

🟢

If Mitigated

Limited impact with proper input validation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit has been published and may be used. Attack can be initiated remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor was contacted but did not respond. Consider upgrading to any version above 2.3.0 if available.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement strict input validation for user_id parameter to prevent manipulation

Implement parameter validation in /src/backend/agentchat/api/v1/user.py

Access Control Enhancement

all

Add session-based or token-based authentication checks before processing user_id

Add authentication middleware to user endpoint functions

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block suspicious user_id parameter manipulation
  • Restrict network access to AgentChat endpoints to trusted IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check if AgentChat version is ≤2.3.0 and review /src/backend/agentchat/api/v1/user.py for proper user_id validation

Check Version:

Check package version or review application configuration files

Verify Fix Applied:

Test user endpoint functions with manipulated user_id parameters to ensure proper access controls

📡 Detection & Monitoring

Log Indicators:

  • Unusual user_id parameter values in API requests
  • Failed authentication attempts followed by successful user data access

Network Indicators:

  • Unusual patterns of requests to /api/v1/user endpoints
  • Requests with manipulated user_id parameters

SIEM Query:

source="agentchat" AND (uri_path="/api/v1/user" AND (param_user_id CONTAINS ".." OR param_user_id MATCHES "[^0-9]"))

🔗 References

📤 Share & Export