Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2075: Improper Access Controls in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2075cvecve-2026-2075
Published: Sat Feb 07 2026 (02/07/2026, 05:02:08 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 02/07/2026, 05:44:29 UTC

Technical Analysis

CVE-2026-2075 identifies an improper access control vulnerability in the yeqifu warehouse software, specifically within the saveRolePermission function of the RoleController.java file. This function is responsible for handling role-permission bindings, a critical security component that governs user privileges within the system. The vulnerability arises because the function does not adequately verify whether the requesting user has the appropriate authorization to modify role permissions. Consequently, an attacker with limited privileges can remotely invoke this function to alter role permissions improperly, potentially escalating their privileges or granting unauthorized access to sensitive system functions. The vulnerability is remotely exploitable over the network without requiring user interaction, increasing its risk profile. The product employs a rolling release model, complicating version tracking and patch management, and no official patch or updated version has been released yet. The flaw was reported early to the project maintainers, but no response or remediation has been provided. Public exploit code is available, which could facilitate attacks by malicious actors. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability. However, the improper access control could lead to unauthorized privilege changes, which may have significant operational consequences depending on deployment context.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized privilege escalation within yeqifu warehouse deployments, potentially allowing attackers to manipulate role permissions and gain elevated access. This could lead to unauthorized data access, modification, or disruption of warehouse operations. Organizations relying on yeqifu warehouse for critical supply chain or inventory management functions may experience operational disruptions or data integrity issues. The availability of public exploit code increases the likelihood of exploitation attempts, especially in environments where the software is exposed to untrusted networks. The medium severity rating suggests moderate risk, but the actual impact depends on the sensitivity of the data and systems managed by yeqifu warehouse. European entities with regulatory obligations around data protection and access controls (e.g., GDPR compliance) could face compliance risks if unauthorized access leads to data breaches. The lack of an official patch necessitates immediate compensating controls to mitigate risk. Attackers exploiting this vulnerability could target organizations in sectors such as manufacturing, logistics, and retail, where warehouse management systems are critical.

Mitigation Recommendations

1. Conduct immediate access control audits on yeqifu warehouse deployments to identify and restrict permissions related to role and permission management functions. 2. Implement network segmentation to isolate warehouse management systems from untrusted networks and limit remote access to trusted administrators only. 3. Monitor logs and alerts for unusual or unauthorized changes to role permissions, employing SIEM tools to detect anomalous behavior. 4. Employ multi-factor authentication and strict identity verification for users with permission management capabilities to reduce risk of compromised accounts. 5. If feasible, temporarily disable or restrict access to the saveRolePermission function or related APIs until a patch is available. 6. Engage with yeqifu project maintainers or community to track patch releases or mitigations. 7. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) with custom rules to detect and block exploit attempts targeting this function. 8. Educate administrators about the vulnerability and the importance of cautious permission management. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential exploitation. 10. Review and harden overall role-based access control policies to minimize privilege exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T07:50:14.598Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6986cde0f9fa50a62fe7f048

Added to database: 2/7/2026, 5:30:08 AM

Last enriched: 2/7/2026, 5:44:29 AM

Last updated: 2/7/2026, 8:12:56 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats