CVE-2026-3693
Published: 08 March 2026
Summary
CVE-2026-3693 is a high-severity Resource Injection (CWE-99) vulnerability. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 6.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated remote exploitation of a public-facing web API endpoint (user.py get/update functions) via resource identifier manipulation (IDOR/CWE-99) directly matches T1190 for gaining unauthorized access or performing modifications.
NVD Description
A flaw has been found in Shy2593666979 AgentChat up to 2.3.0. This issue affects the function get_user_info/update_user_info of the file /src/backend/agentchat/api/v1/user.py of the component User Endpoint. This manipulation of the argument user_id causes improper control of resource identifiers. It is…
more
possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Deeper analysisAI
CVE-2026-3693 is a vulnerability in Shy2593666979 AgentChat versions up to 2.3.0, affecting the get_user_info and update_user_info functions in the file /src/backend/agentchat/api/v1/user.py within the User Endpoint component. The flaw stems from improper control of resource identifiers (CWE-99), triggered by manipulation of the user_id argument.
The vulnerability enables remote exploitation by unauthenticated attackers (PR:N) with low attack complexity (AC:L) and no user interaction (UI:N), yielding a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Attackers can achieve low impacts on confidentiality, integrity, and availability, likely allowing unauthorized access, modification, or disruption of user resources by bypassing identifier controls.
Advisories note that the vendor was contacted early regarding this disclosure but provided no response, with no patches or mitigations mentioned. Exploits have been published and are available in GitHub repositories such as https://github.com/CC-T-454455/Vulnerabilities/tree/master/agent-chat/vulnerability-1 and https://github.com/CC-T-454455/Vulnerabilities/tree/master/agent-chat/vulnerability-2, alongside details on VulDB at https://vuldb.com/?ctiid.349640, https://vuldb.com/?id.349640, and https://vuldb.com/?submit.765589.
Details
- CWE(s)