Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can manually modify the request payload and assign themselves elevated privileges. Because the backend does not enforce role assignment restrictions or ignore client-supplied role parameters, the server accepts the manipulated value and creates the account with SUPER_ADMIN privileges. This allows any unauthenticated attacker to register a fully privileged administrative account.
History

Fri, 13 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Taskosaur
Taskosaur taskosaur
Vendors & Products Taskosaur
Taskosaur taskosaur

Wed, 11 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Taskosaur is an open source project management platform with conversational AI for task execution in-app. In 1.0.0, the application does not properly validate or restrict the role parameter during the user registration process. An attacker can manually modify the request payload and assign themselves elevated privileges. Because the backend does not enforce role assignment restrictions or ignore client-supplied role parameters, the server accepts the manipulated value and creates the account with SUPER_ADMIN privileges. This allows any unauthenticated attacker to register a fully privileged administrative account.
Title Taskosaur Improper Role Assignment via Parameter Manipulation in User Registration
Weaknesses CWE-284
CWE-639
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-03-11T18:13:33.936Z

Updated: 2026-03-12T20:08:36.826Z

Reserved: 2026-03-09T19:02:25.014Z

Link: CVE-2026-31874

cve-icon Vulnrichment

Updated: 2026-03-12T20:08:34.013Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T19:16:03.970

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-31874

cve-icon Redhat

No data.