CVE-2026-2105: Improper Authorization in yeqifu warehouse
A flaw has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. The affected element is the function addDept/updateDept/deleteDept of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\DeptController.java of the component Department Management. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been published and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-2105 is an improper authorization vulnerability identified in the yeqifu warehouse software, specifically within the Department Management component's addDept, updateDept, and deleteDept functions in DeptController.java. This flaw allows an attacker to perform unauthorized operations on department data by bypassing intended access controls. The vulnerability is remotely exploitable and requires low privileges (PR:L), meaning the attacker must have some authenticated access but no elevated privileges. No user interaction is needed, and the attack vector is network-based (AV:N). The vulnerability impacts confidentiality, integrity, and availability at a low level, as unauthorized modifications to department data could disrupt organizational operations or leak sensitive information. The software's rolling release approach means affected and fixed versions are not clearly delineated, and the vendor has not yet issued a patch or official response. An exploit has been published, increasing the risk of exploitation despite no current reports of active attacks. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing ease of exploitation with limited scope and impact. Organizations relying on yeqifu warehouse should be aware of this vulnerability and implement compensating controls until a patch is available.
Potential Impact
The improper authorization vulnerability in yeqifu warehouse could allow attackers with low-level privileges to manipulate department data without proper authorization. This can lead to unauthorized creation, modification, or deletion of department records, potentially disrupting organizational workflows, causing data integrity issues, and leaking sensitive internal structure information. While the impact on confidentiality and availability is limited, integrity violations could affect business processes and decision-making. The remote exploitability and published exploit code increase the risk of targeted attacks, especially in environments where yeqifu warehouse is used for critical departmental management. Organizations may face operational disruptions, compliance risks, and reputational damage if exploited. The lack of vendor response and patch availability prolongs exposure, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Implement strict access control policies restricting who can access department management functions, ensuring only trusted and necessary users have such privileges. 2. Employ network segmentation and firewall rules to limit access to the yeqifu warehouse application, especially restricting access to the DeptController endpoints. 3. Monitor logs and audit trails for unusual activity related to department creation, updates, or deletions to detect potential exploitation attempts early. 4. Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable functions. 5. Engage in proactive vulnerability scanning and penetration testing focused on authorization controls within the application. 6. Contact the vendor or maintainers for updates and patches, and plan for rapid deployment once available. 7. Consider temporary compensating controls such as disabling or restricting the affected functions if feasible until a patch is released. 8. Educate internal users about the risk and encourage reporting of suspicious behavior related to department management.
Affected Countries
China, United States, India, Germany, Brazil, Russia, South Korea, Japan, United Kingdom, France
CVE-2026-2105: Improper Authorization in yeqifu warehouse
Description
A flaw has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. The affected element is the function addDept/updateDept/deleteDept of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\DeptController.java of the component Department Management. Executing a manipulation can lead to improper authorization. It is possible to launch the attack remotely. The exploit has been published and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2105 is an improper authorization vulnerability identified in the yeqifu warehouse software, specifically within the Department Management component's addDept, updateDept, and deleteDept functions in DeptController.java. This flaw allows an attacker to perform unauthorized operations on department data by bypassing intended access controls. The vulnerability is remotely exploitable and requires low privileges (PR:L), meaning the attacker must have some authenticated access but no elevated privileges. No user interaction is needed, and the attack vector is network-based (AV:N). The vulnerability impacts confidentiality, integrity, and availability at a low level, as unauthorized modifications to department data could disrupt organizational operations or leak sensitive information. The software's rolling release approach means affected and fixed versions are not clearly delineated, and the vendor has not yet issued a patch or official response. An exploit has been published, increasing the risk of exploitation despite no current reports of active attacks. The CVSS 4.0 score of 5.3 reflects a medium severity, balancing ease of exploitation with limited scope and impact. Organizations relying on yeqifu warehouse should be aware of this vulnerability and implement compensating controls until a patch is available.
Potential Impact
The improper authorization vulnerability in yeqifu warehouse could allow attackers with low-level privileges to manipulate department data without proper authorization. This can lead to unauthorized creation, modification, or deletion of department records, potentially disrupting organizational workflows, causing data integrity issues, and leaking sensitive internal structure information. While the impact on confidentiality and availability is limited, integrity violations could affect business processes and decision-making. The remote exploitability and published exploit code increase the risk of targeted attacks, especially in environments where yeqifu warehouse is used for critical departmental management. Organizations may face operational disruptions, compliance risks, and reputational damage if exploited. The lack of vendor response and patch availability prolongs exposure, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Implement strict access control policies restricting who can access department management functions, ensuring only trusted and necessary users have such privileges. 2. Employ network segmentation and firewall rules to limit access to the yeqifu warehouse application, especially restricting access to the DeptController endpoints. 3. Monitor logs and audit trails for unusual activity related to department creation, updates, or deletions to detect potential exploitation attempts early. 4. Use Web Application Firewalls (WAFs) to detect and block suspicious requests targeting the vulnerable functions. 5. Engage in proactive vulnerability scanning and penetration testing focused on authorization controls within the application. 6. Contact the vendor or maintainers for updates and patches, and plan for rapid deployment once available. 7. Consider temporary compensating controls such as disabling or restricting the affected functions if feasible until a patch is released. 8. Educate internal users about the risk and encourage reporting of suspicious behavior related to department management.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-06T14:15:55.535Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6987732cf9fa50a62f350edd
Added to database: 2/7/2026, 5:15:24 PM
Last enriched: 2/23/2026, 9:27:14 PM
Last updated: 3/25/2026, 10:04:10 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.