Description
A security flaw has been discovered in suitenumerique messages 0.2.0. This issue affects the function ThreadAccessSerializer of the file src/backend/core/api/serializers.py of the component ThreadAccess. The manipulation results in improper authentication. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.3.0 is capable of addressing this issue. The patch is identified as d7729f4b885449f6dee3faf8b5f2a05769fb3d6e. The affected component should be upgraded.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authentication (CWE-287) can lead to unauthorized access to the suitenumerique messages application
Action: Patch Now
AI Analysis

Impact

The vulnerability resides in the ThreadAccessSerializer class of suitenumerique messages. An attacker can manipulate requests so that authentication checks are bypassed, allowing them to assume any user identity. The results in a classic authentication bypass (CWE-287) and is capable of being exploited remotely through the exposed API endpoint. It can enable an attacker to gain unauthorized access to sensitive information and perform privileged actions without proper credentials.

Affected Systems

The issue affects the suitenumerique messages package, specifically version 0.2.0. The official recommendation is to upgrade to version 0.3.0, which incorporates the fix. The affected component is the ThreadAccess API, located in the src/backend/core/api/serializers.py file.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild at this time. The vulnerability is not listed in CISA's KEV catalog, and a public exploit has been released, enabling attackers to target this flaw. The attack vector is remote, relying on sending crafted requests to the ThreadAccessSerializer endpoint. If the system is not patched, an attacker could obtain unauthorized access to user data and potentially elevate privileges within the application.

Generated by OpenCVE AI on April 16, 2026 at 10:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade suitenumerique messages to version 0.3.0 or later, which contains the fixed commit d7729f4b885449f6dee3faf8b5f2a05769fb3d6e.
  • Ensure that any custom code around ThreadAccessSerializer performs proper authentication checks before granting access to protected resources.
  • If an upgrade cannot be performed immediately, restrict network access to the ThreadAccess API endpoint to trusted IP ranges or enforce additional authentication layers (e.g., API keys).
  • Monitor application logs for unexpected authentication patterns or repeated failed attempts to indicate exploitation attempts.

Generated by OpenCVE AI on April 16, 2026 at 10:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Suitenumerique
Suitenumerique messages
Vendors & Products Suitenumerique
Suitenumerique messages

Sun, 08 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in suitenumerique messages 0.2.0. This issue affects the function ThreadAccessSerializer of the file src/backend/core/api/serializers.py of the component ThreadAccess. The manipulation results in improper authentication. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.3.0 is capable of addressing this issue. The patch is identified as d7729f4b885449f6dee3faf8b5f2a05769fb3d6e. The affected component should be upgraded.
Title suitenumerique messages ThreadAccess serializers.py ThreadAccessSerializer improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Suitenumerique Messages
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-12T15:00:17.476Z

Reserved: 2026-03-07T20:07:31.011Z

Link: CVE-2026-3739

cve-icon Vulnrichment

Updated: 2026-03-12T15:00:10.792Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-08T14:15:54.963

Modified: 2026-03-09T13:35:07.393

Link: CVE-2026-3739

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T10:45:26Z

Weaknesses