CVE-2026-2078: Improper Authorization in yeqifu warehouse
A vulnerability was detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addPermission/updatePermission/deletePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\PermissionController.java of the component Permission Management. Performing a manipulation results in improper authorization. The attack may be initiated remotely. The exploit is now public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-2078 is an improper authorization vulnerability found in the yeqifu warehouse product, specifically within the PermissionController.java file's addPermission, updatePermission, and deletePermission functions. These functions handle permission management, and the flaw allows an attacker to remotely manipulate authorization settings without proper privilege checks. The vulnerability arises due to insufficient validation of the requester's rights before modifying permission data, leading to unauthorized changes. The affected version is identified by a specific commit hash (aaf29962ba407d22d991781de28796ee7b4670e4), but due to the product's rolling release model, multiple versions may be impacted. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. The exploit is publicly available, increasing the risk of exploitation despite no known widespread attacks yet. The vendor has been notified but has not issued a patch or official response. This vulnerability can lead to unauthorized privilege escalation or unauthorized permission changes, potentially compromising system security and data integrity within affected environments.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access and privilege escalation within systems using yeqifu warehouse for permission management. Attackers could remotely alter permissions, potentially granting themselves or others elevated rights, leading to data exposure, unauthorized modifications, or disruption of services. This could impact confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability if critical permissions are revoked or misconfigured. Organizations in sectors with strict regulatory requirements (e.g., finance, healthcare, government) may face compliance violations and reputational damage. The lack of vendor response and public exploit availability increases the urgency to address the issue proactively. The rolling release nature complicates patch management, requiring continuous vigilance. Overall, the threat could disrupt business operations and compromise sensitive information if exploited.
Mitigation Recommendations
1. Immediately restrict access to the permission management functions (addPermission, updatePermission, deletePermission) to only highly trusted administrators using network segmentation and access control lists. 2. Implement enhanced monitoring and logging for all permission changes to detect suspicious or unauthorized modifications promptly. 3. Conduct a thorough audit of current permissions to identify and remediate any unauthorized changes that may have occurred. 4. Apply strict input validation and enforce role-based access controls at the application layer as a temporary mitigation if source code modification is possible. 5. Engage with the yeqifu project or community to track patch releases or security advisories and apply updates as soon as they become available. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting permission management endpoints. 7. Educate administrators about the vulnerability and the importance of cautious permission management and monitoring. 8. For critical environments, consider isolating or temporarily disabling the affected components until a patch is available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2026-2078: Improper Authorization in yeqifu warehouse
Description
A vulnerability was detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addPermission/updatePermission/deletePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\PermissionController.java of the component Permission Management. Performing a manipulation results in improper authorization. The attack may be initiated remotely. The exploit is now public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Technical Analysis
CVE-2026-2078 is an improper authorization vulnerability found in the yeqifu warehouse product, specifically within the PermissionController.java file's addPermission, updatePermission, and deletePermission functions. These functions handle permission management, and the flaw allows an attacker to remotely manipulate authorization settings without proper privilege checks. The vulnerability arises due to insufficient validation of the requester's rights before modifying permission data, leading to unauthorized changes. The affected version is identified by a specific commit hash (aaf29962ba407d22d991781de28796ee7b4670e4), but due to the product's rolling release model, multiple versions may be impacted. The CVSS 4.0 score is 5.3 (medium), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on confidentiality, integrity, and availability. The exploit is publicly available, increasing the risk of exploitation despite no known widespread attacks yet. The vendor has been notified but has not issued a patch or official response. This vulnerability can lead to unauthorized privilege escalation or unauthorized permission changes, potentially compromising system security and data integrity within affected environments.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access and privilege escalation within systems using yeqifu warehouse for permission management. Attackers could remotely alter permissions, potentially granting themselves or others elevated rights, leading to data exposure, unauthorized modifications, or disruption of services. This could impact confidentiality by exposing sensitive data, integrity by allowing unauthorized changes, and availability if critical permissions are revoked or misconfigured. Organizations in sectors with strict regulatory requirements (e.g., finance, healthcare, government) may face compliance violations and reputational damage. The lack of vendor response and public exploit availability increases the urgency to address the issue proactively. The rolling release nature complicates patch management, requiring continuous vigilance. Overall, the threat could disrupt business operations and compromise sensitive information if exploited.
Mitigation Recommendations
1. Immediately restrict access to the permission management functions (addPermission, updatePermission, deletePermission) to only highly trusted administrators using network segmentation and access control lists. 2. Implement enhanced monitoring and logging for all permission changes to detect suspicious or unauthorized modifications promptly. 3. Conduct a thorough audit of current permissions to identify and remediate any unauthorized changes that may have occurred. 4. Apply strict input validation and enforce role-based access controls at the application layer as a temporary mitigation if source code modification is possible. 5. Engage with the yeqifu project or community to track patch releases or security advisories and apply updates as soon as they become available. 6. Consider deploying Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting permission management endpoints. 7. Educate administrators about the vulnerability and the importance of cautious permission management and monitoring. 8. For critical environments, consider isolating or temporarily disabling the affected components until a patch is available.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T07:57:17.656Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6986f48df9fa50a62f1325cf
Added to database: 2/7/2026, 8:15:09 AM
Last enriched: 2/7/2026, 8:29:27 AM
Last updated: 2/7/2026, 12:52:52 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.