VYPR
Critical severity9.8NVD Advisory· Published May 19, 2026· Updated May 20, 2026

CVE-2026-31070

CVE-2026-31070

Description

The LalanaChami Pharmacy Management System (commit 5c3d028) allows unauthenticated remote attackers to escalate privileges by self-assigning an administrative role during registration. The /api/user/signup endpoint fails to validate the role parameter in the request body

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated remote attackers can self-assign an admin role via the signup endpoint, leading to full system compromise.

Vulnerability

The LalanaChami Pharmacy Management System (commit 5c3d028) contains an authentication bypass vulnerability in the /api/user/signup endpoint. The endpoint fails to validate the role parameter in the request body, allowing any unregistered user to set their role to "admin" during account creation. No authentication is required to reach this endpoint, and no server-side checks prevent privilege escalation. The same repository also exposes multiple other APIs (e.g., getUserData) without authentication, as detailed in the reference [1].

Exploitation

An attacker with network access to the application can send a POST request to /api/user/signup with a crafted JSON body containing a role field set to an administrative value (e.g., "admin"). No prior authentication, user interaction, or special privileges are needed. The server will create a new user account with full administrative privileges, allowing the attacker to then log in and access all subsequent API endpoints [1].

Impact

Successful exploitation grants the attacker complete control over the Pharmacy Management System. The attacker can read all data, including user records with bcrypt password hashes, drug inventory, doctor prescriptions, and financial records. Additionally, limited write access enables unauthorized creation, modification, and deletion of users, inventory items, and medical records. This leads to total compromise of confidentiality, integrity, and availability of the system [1].

Mitigation

As of the publication date (2026-05-19), no patched version or official fix has been released. The maintainer has not tagged any releases or provided a version number beyond 0.0.0. The only mitigation is to restrict network access to the application (e.g., via firewall rules or a VPN) until a fix is deployed. The vendor should implement authentication middleware on all critical endpoints and validate the role parameter during registration to prevent self-assignment of elevated privileges [1].

References
  1. CVE-2026-31070

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.