Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can manually modify the request payload and assign themselves elevated privileges. Because the backend does not enforce role assignment restrictions or ignore client-supplied role parameters, the server accepts the manipulated value and creates the account with SUPER_ADMIN privileges. This allows any unauthenticated attacker to register a fully privileged administrative account.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Taskosaur
Taskosaur taskosaur |
|
| Vendors & Products |
Taskosaur
Taskosaur taskosaur |
Wed, 11 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can manually modify the request payload and assign themselves elevated privileges. Because the backend does not enforce role assignment restrictions or ignore client-supplied role parameters, the server accepts the manipulated value and creates the account with SUPER_ADMIN privileges. This allows any unauthenticated attacker to register a fully privileged administrative account. | |
| Title | Taskosaur Improper Role Assignment via Parameter Manipulation in User Registration | |
| Weaknesses | CWE-284 CWE-639 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-11T18:13:33.936Z
Updated: 2026-03-12T20:08:36.826Z
Reserved: 2026-03-09T19:02:25.014Z
Link: CVE-2026-31874
Updated: 2026-03-12T20:08:34.013Z
Status : Awaiting Analysis
Published: 2026-03-11T19:16:03.970
Modified: 2026-03-12T21:08:22.643
Link: CVE-2026-31874
No data.