Impact
The vulnerability resides in the ThreadAccessSerializer class of suitenumerique messages. An attacker can manipulate requests so that authentication checks are bypassed, allowing them to assume any user identity. The results in a classic authentication bypass (CWE-287) and is capable of being exploited remotely through the exposed API endpoint. It can enable an attacker to gain unauthorized access to sensitive information and perform privileged actions without proper credentials.
Affected Systems
The issue affects the suitenumerique messages package, specifically version 0.2.0. The official recommendation is to upgrade to version 0.3.0, which incorporates the fix. The affected component is the ThreadAccess API, located in the src/backend/core/api/serializers.py file.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of exploitation in the wild at this time. The vulnerability is not listed in CISA's KEV catalog, and a public exploit has been released, enabling attackers to target this flaw. The attack vector is remote, relying on sending crafted requests to the ThreadAccessSerializer endpoint. If the system is not patched, an attacker could obtain unauthorized access to user data and potentially elevate privileges within the application.
OpenCVE Enrichment