CVE-2026-5031
Received Received - Intake
ID Manipulation Vulnerability in BichitroGan ISP Billing Endpoint

Publication date: 2026-03-29

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in BichitroGan ISP Billing Software 2025.3.20. Impacted is an unknown function of the file /?_route=settings/users-view/ of the component Endpoint. The manipulation of the argument ID results in improper control of resource identifiers. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-29
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bichitrogan isp_billing_software 2025.3.20
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-99 The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-5031 is an Insecure Direct Object Reference (IDOR) vulnerability found in the BichitroGan ISP Billing Software version 2025.3.20. It affects the User Management Module at the endpoint where the 'id' parameter in the URL is user-controlled and lacks proper authorization validation.

This means that low-privileged authenticated users, such as those with Sales or Agent roles, can manipulate the 'id' parameter to access other users' account information, including administrative accounts, without permission.

The root cause is the application's failure to verify whether the requesting user has permission to access the user profile data identified by the 'id' parameter, leading to unauthorized exposure of sensitive user and operational data.


How can this vulnerability impact me? :

This vulnerability allows attackers with low privileges to enumerate and access other users' account information, including sensitive administrative data.

The impact includes unauthorized exposure of sensitive ISP user data, enabling attackers to perform privilege escalation reconnaissance and potentially target administrator accounts.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access user profile data via the endpoint with manipulated ID parameters in the URL. Specifically, after logging in as a low-privileged user, you can try to modify the `id` parameter in the URL `https://demo.bichitrogan.com/?_route=settings/users-view/{id}` to see if you can access other users' information without proper authorization.

A practical detection method involves using HTTP request tools such as curl or browser developer tools to send requests with different `id` values and observe if unauthorized data is returned.

  • Example curl command to test access control bypass:
  • curl -i -b cookies.txt "https://demo.bichitrogan.com/?_route=settings/users-view/2"
  • Replace `2` with different user IDs to check if data from other users is accessible.

If the server returns user data for IDs other than the logged-in user's ID without proper authorization errors, the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing strict server-side authorization checks to ensure that users can only access their own data unless explicitly authorized.

  • Enforce role-based access control (RBAC) on all user-related endpoints.
  • Restrict users from viewing or manipulating other users' accounts unless they have administrative privileges.
  • Avoid exposing sequential numeric identifiers in URLs that can be easily manipulated.
  • Centralize access control logic to ensure consistent authorization checks across the application.

An example security check is to deny access if the current user ID does not match the requested user ID and the current user is not an administrator.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized access to sensitive user and operational data by low-privileged users, leading to exposure of personal and administrative account information. This unauthorized exposure of sensitive information can result in non-compliance with data protection regulations such as GDPR and HIPAA, which mandate strict controls on access to personal and sensitive data.

Specifically, the lack of proper authorization checks and improper access control could violate principles of data confidentiality and integrity required by these standards, potentially leading to legal and regulatory repercussions for the affected organization.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart