Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2076: Improper Authorization in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2076cvecve-2026-2076
Published: Sat Feb 07 2026 (02/07/2026, 06:32:07 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this vulnerability is the function addUser/updateUser/deleteUser of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component User Management Endpoint. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:23:51 UTC

Technical Analysis

CVE-2026-2076 identifies an improper authorization vulnerability in the yeqifu warehouse software, specifically within the User Management Endpoint implemented in the UserController.java file. The affected functions—addUser, updateUser, and deleteUser—lack sufficient authorization controls, allowing an attacker with limited privileges to remotely manipulate user accounts. This flaw arises from inadequate verification of the attacker's permissions before executing critical user management operations. The vulnerability is present in the codebase up to commit aaf29962ba407d22d991781de28796ee7b4670e4. Due to the product's continuous delivery model with rolling releases, specific version details for affected or patched releases are unavailable. The vulnerability has a CVSS 4.0 base score of 5.3, indicating medium severity, with an attack vector of network (remote), low attack complexity, no required privileges, and no user interaction. The impact vector components indicate limited confidentiality, integrity, and availability impacts but still significant due to unauthorized user management capabilities. Although no known exploits are currently active in the wild, a public exploit is available, increasing the risk of exploitation. The vendor has been notified but has not yet responded or released a patch. This vulnerability could be leveraged to escalate privileges, create unauthorized accounts, or disrupt user management processes, potentially compromising the overall security posture of affected deployments.

Potential Impact

The improper authorization vulnerability in yeqifu warehouse's user management functions can lead to unauthorized creation, modification, or deletion of user accounts. This undermines the integrity and confidentiality of user data and can facilitate privilege escalation or persistent unauthorized access. Organizations relying on yeqifu warehouse for critical operations risk exposure to insider threats or external attackers who gain limited access but can exploit this flaw to expand control. The availability of user management services may also be disrupted if attackers delete or alter accounts maliciously. Given the remote exploitability without user interaction or elevated privileges, the threat can propagate rapidly in exposed environments. The lack of vendor response and patch availability increases the window of exposure. This vulnerability could impact compliance with access control and identity management policies, potentially leading to regulatory and reputational consequences.

Mitigation Recommendations

Organizations should immediately audit and restrict access to the User Management Endpoint in yeqifu warehouse, ensuring only fully trusted and authenticated administrators have permissions to invoke addUser, updateUser, and deleteUser functions. Implement network-level access controls such as IP whitelisting or VPN requirements to limit exposure. Employ Web Application Firewalls (WAFs) to detect and block anomalous requests targeting user management APIs. Monitor logs for unusual user account activities, including unexpected creations, modifications, or deletions. If possible, temporarily disable remote user management features until a vendor patch is available. Engage in code review or implement custom authorization checks as a temporary mitigation if source code access is available. Maintain up-to-date backups of user data and configuration to enable recovery from malicious changes. Stay alert for vendor updates or community patches and apply them promptly once released. Consider isolating the yeqifu warehouse deployment in segmented network zones to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T07:57:10.089Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6986df75f9fa50a62ff9d900

Added to database: 2/7/2026, 6:45:09 AM

Last enriched: 2/23/2026, 9:23:51 PM

Last updated: 3/24/2026, 9:38:42 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses