Vulnerability Description
A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_user_info/update_user_info of the file /src/backend/agentchat/api/v1/user.py of the component User Endpoint. This manipulation of the argument user_id causes improper control of resource identifiers. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/CC-T-454455/Vulnerabilities/tree/master/agent-chat/vulnerabil
- https://github.com/CC-T-454455/Vulnerabilities/tree/master/agent-chat/vulnerabil
- https://vuldb.com/?ctiid.349640
- https://vuldb.com/?id.349640
- https://vuldb.com/?submit.765589
- https://vuldb.com/?submit.765590
FAQ
What is CVE-2026-3693?
CVE-2026-3693 is a vulnerability with a CVSS score of 7.3 (HIGH). A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_user_info/update_user_info of the file /src/backend/agentchat/api/v1/user.py of the component User End...
How severe is CVE-2026-3693?
CVE-2026-3693 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3693?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.