Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2077: Improper Authorization in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2077cvecve-2026-2077
Published: Sat Feb 07 2026 (02/07/2026, 07:32:07 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A security vulnerability has been detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function addRole/updateRole/deleteRole of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role Management Handler. Such manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 02/07/2026, 07:59:28 UTC

Technical Analysis

CVE-2026-2077 identifies an improper authorization vulnerability in the yeqifu warehouse software, specifically within the Role Management Handler component. The affected functions—addRole, updateRole, and deleteRole—reside in the RoleController.java source file and are responsible for managing user roles. Due to insufficient authorization checks, an attacker with low privileges can remotely invoke these functions to manipulate roles without proper permissions. This flaw allows unauthorized role creation, modification, or deletion, potentially enabling privilege escalation or disruption of role-based access controls. The vulnerability is remotely exploitable without user interaction and does not require elevated privileges beyond low-level access. The product does not implement versioning, making it difficult to determine which versions are unaffected. The vendor has been notified but has not yet issued a patch or response. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the ease of remote exploitation and the partial impact on confidentiality, integrity, and availability. No known exploits have been observed in the wild, but public disclosure increases the risk of exploitation attempts.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized role manipulation, resulting in privilege escalation or disruption of access controls. This can compromise the confidentiality of sensitive data by granting unauthorized access, affect integrity by altering role assignments improperly, and impact availability if critical roles are deleted or modified to disrupt operations. Organizations relying on yeqifu warehouse for inventory or warehouse management may face operational disruptions, data breaches, or insider threat scenarios. The lack of vendor response and patch availability increases the window of exposure. Given the remote exploitability and no requirement for user interaction, attackers could automate attacks to compromise multiple systems rapidly. This threat is particularly concerning for sectors with strict regulatory requirements such as finance, healthcare, and manufacturing within Europe, where role-based access controls are critical for compliance and operational security.

Mitigation Recommendations

1. Implement strict access control checks at the application layer for all role management functions, ensuring only authorized administrators can invoke addRole, updateRole, and deleteRole operations. 2. Employ network segmentation and firewall rules to restrict access to the RoleController endpoints to trusted administrative networks or VPNs. 3. Monitor and audit role management activities closely, setting up alerts for unusual role changes or access patterns. 4. If possible, deploy Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized attempts to access role management APIs. 5. Conduct thorough code reviews and penetration testing focused on authorization logic in the affected components. 6. Engage with the vendor or community to obtain patches or updates; if unavailable, consider temporary compensating controls such as disabling remote role management or restricting it to offline or controlled environments. 7. Maintain an inventory of all yeqifu warehouse instances and assess exposure to this vulnerability. 8. Educate administrators on the risks of improper role management and enforce strong authentication and authorization policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T07:57:14.674Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6986ed85f9fa50a62f0d9a21

Added to database: 2/7/2026, 7:45:09 AM

Last enriched: 2/7/2026, 7:59:28 AM

Last updated: 2/7/2026, 8:54:27 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats