Summary & Impact Summary: Import and outport endpoints do not enforce permissions. Attackers can forge inventory movements, adjust quantities, or delete records. Impact: This can lead to stock inaccuracies, financial discrepancies, and possible abuse of procurement/return workflows. Affected Code addImport: updateImport: deleteImport: addOutport: deleteOutport: PoC Vulnerability Description The endpoints , , , , and are vulnerable to unauthorized access. The vulnerability arises from the lack of permission checks before performing operations, allowing any user to manipulate inventory data.