Description
Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat that allows private conversations of other users being viewed by simply changing the conversation ID. The vulnerability is present in the endpoint 'api.1millionbot.com/api/public/conversations/' and, if exploited, could allow a remote attacker to access other users private chatbot conversations, revealing sensitive or confidential data without requiring credentials or impersonating users. In order for the vulnerability to be exploited, the attacker must have the user's conversation ID.
Published: 2026-03-31
Score: 7 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidential Information Disclosure
Action: Apply Patch
AI Analysis

Impact

An insecure direct object reference in 1millionbot Millie chat allows a remote attacker to alter the conversation ID in the API request and view another user's private conversations without needing any credentials. This vulnerability can expose sensitive or confidential data that was otherwise intended to remain private. The weakness is a common example of identifier exposure, which permits unauthorized data access.

Affected Systems

The affected product is 1millionbot Millie chat. Versions prior to 3.6.0 contain the flaw; the fix is available in the 3.6.0 release.

Risk and Exploitability

The CVSS score of 7 indicates high severity, and while an exploit probability score is not available, the vulnerability can be leveraged simply by knowing a conversation identifier. The ability to read private data without authentication raises substantial risk to confidentiality for all affected users. The vulnerability is not listed in the CISA KeV catalog, but its impact and ease of exploitation make it a significant concern.

Generated by OpenCVE AI on March 31, 2026 at 11:20 UTC.

Remediation

Vendor Solution

The vulnerabilities have been fixed by 1millionbot team in version 3.6.0.


OpenCVE Recommended Actions

  • Upgrade 1millionbot Millie chat to version 3.6.0 or later, which contains the vendor patch.
  • Restrict the /api/public/conversations/ endpoint so that only authenticated sessions can request conversation data, adding an additional access control check.
  • Invalidate or rotate conversation identifiers so that old IDs cannot be used after an exposure.
  • Monitor API usage for anomalous activity patterns that may indicate exploitation attempts.
  • Warn users not to share or expose conversation identifiers with others.

Generated by OpenCVE AI on March 31, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description Insecure Direct Object Reference (IDOR) vulnerability in 1millionbot Millie chat that allows private conversations of other users being viewed by simply changing the conversation ID. The vulnerability is present in the endpoint 'api.1millionbot.com/api/public/conversations/' and, if exploited, could allow a remote attacker to access other users private chatbot conversations, revealing sensitive or confidential data without requiring credentials or impersonating users. In order for the vulnerability to be exploited, the attacker must have the user's conversation ID.
Title Multiple vulnerabilities in 1millionbot Millie chatbot
First Time appeared 1millionbot
1millionbot millie Chat
Weaknesses CWE-639
CPEs cpe:2.3:a:1millionbot:millie_chat:3.6.0:*:*:*:*:*:*:*
Vendors & Products 1millionbot
1millionbot millie Chat
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N'}


Subscriptions

1millionbot Millie Chat
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-03-31T13:30:36.779Z

Reserved: 2026-03-18T17:18:51.920Z

Link: CVE-2026-4400

cve-icon Vulnrichment

Updated: 2026-03-31T13:30:32.769Z

cve-icon NVD

Status : Received

Published: 2026-03-31T11:16:14.470

Modified: 2026-03-31T11:16:14.470

Link: CVE-2026-4400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T20:39:13Z

Weaknesses