Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2075: Improper Access Controls in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2075cvecve-2026-2075
Published: Sat Feb 07 2026 (02/07/2026, 05:02:08 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:12:18 UTC

Technical Analysis

CVE-2026-2075 is a security vulnerability identified in the yeqifu warehouse software, specifically within the Role-Permission Binding Handler component. The vulnerability resides in the saveRolePermission function located in the RoleController.java file. Due to improper access control implementation, an attacker can remotely exploit this flaw without requiring authentication or user interaction. The vulnerability allows manipulation of role permissions, which can lead to unauthorized privilege escalation or unauthorized modification of access rights within the system. The product's rolling release model complicates identification of fixed versions, and as of the publication date, the vendor has not responded to the issue report. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of remote exploitation (attack vector network, low attack complexity), no authentication required, and limited impact on confidentiality, integrity, and availability. Although no known exploits in the wild have been reported, the public availability of exploit code increases the risk of attacks. The vulnerability affects all versions up to commit aaf29962ba407d22d991781de28796ee7b4670e4. Organizations using yeqifu warehouse should consider this vulnerability a significant risk to their access control mechanisms and take immediate action to mitigate potential exploitation.

Potential Impact

The improper access control vulnerability in yeqifu warehouse can lead to unauthorized modification of role permissions, enabling attackers to escalate privileges or alter access rights within the system. This can compromise the confidentiality and integrity of sensitive data managed by the warehouse application. Attackers exploiting this flaw remotely can gain unauthorized control over role assignments, potentially leading to further lateral movement within an organization's infrastructure. The availability impact is limited but could occur if attackers disrupt role management functionality. Given the role of access control in securing enterprise applications, exploitation could facilitate data breaches, unauthorized data manipulation, or disruption of business processes. Organizations relying on yeqifu warehouse for critical operations or sensitive data management face increased risk of insider-like attacks or external compromise. The public release of exploit code heightens the urgency for mitigation, as opportunistic attackers may leverage this vulnerability before patches are available.

Mitigation Recommendations

1. Immediately restrict network access to the yeqifu warehouse RoleController endpoints, especially those handling role permission changes, using firewalls or network segmentation. 2. Implement strict access control policies at the application and infrastructure level to limit who can invoke role permission management functions. 3. Monitor logs and audit trails for unusual or unauthorized attempts to modify role permissions or access the RoleController component. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the saveRolePermission function. 5. Engage with the yeqifu vendor or community to obtain patches or updates as soon as they become available, given the rolling release model. 6. Consider deploying runtime application self-protection (RASP) tools to detect and prevent exploitation attempts in real-time. 7. Conduct a thorough review of existing role permissions to ensure no excessive privileges exist that could be abused if the vulnerability is exploited. 8. Educate internal teams about this vulnerability and the importance of monitoring for related attack indicators. 9. If possible, isolate the yeqifu warehouse deployment from public internet exposure until a patch is applied. 10. Prepare incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T07:50:14.598Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6986cde0f9fa50a62fe7f048

Added to database: 2/7/2026, 5:30:08 AM

Last enriched: 2/23/2026, 10:12:18 PM

Last updated: 3/24/2026, 10:44:30 AM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses