Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2849: Improper Access Controls in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2849cvecve-2026-2849
Published: Fri Feb 20 2026 (02/20/2026, 16:02:09 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A vulnerability has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function deleteCache/removeAllCache/syncCache of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\CacheController.java of the component Cache Sync Handler. Such manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:51:05 UTC

Technical Analysis

CVE-2026-2849 identifies an improper access control vulnerability in the yeqifu warehouse software, specifically within the Cache Sync Handler component's functions: deleteCache, removeAllCache, and syncCache. These functions reside in the CacheController.java file and are responsible for managing cache operations. Due to insufficient access control checks, remote attackers can invoke these functions to manipulate cache data without proper authorization. This can lead to unauthorized cache deletion or synchronization, potentially causing data integrity issues or denial of service conditions. The vulnerability is exploitable remotely without user interaction and requires only low-level privileges, increasing its risk profile. The yeqifu warehouse product follows a rolling release model, meaning continuous updates without fixed version numbers, which complicates identifying affected versions and deploying patches. Despite early reporting, the vendor has not issued a fix or official response. The CVSS 4.0 score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, combined with ease of exploitation. No public exploits are currently known, but the vulnerability's public disclosure increases the risk of future exploitation.

Potential Impact

The improper access control vulnerability in yeqifu warehouse's cache management functions can lead to unauthorized cache manipulation by remote attackers. This can result in data integrity compromise, where cache data is deleted or altered maliciously, potentially causing application errors, stale or incorrect data delivery, or denial of service if critical cache data is removed. Organizations relying on yeqifu warehouse for data storage or processing may experience operational disruptions, degraded performance, or data inconsistencies. Since the vulnerability requires only low-level privileges and no user interaction, attackers with minimal access could exploit it to escalate their impact. The lack of vendor response and patch increases exposure time, raising the risk of exploitation in production environments. This threat is particularly concerning for organizations with sensitive data or critical operations dependent on cache consistency and availability.

Mitigation Recommendations

To mitigate CVE-2026-2849, organizations should implement strict network-level access controls to limit exposure of the Cache Sync Handler endpoints to trusted users and systems only. Employ firewall rules or API gateways to restrict remote access to cache management functions. Conduct thorough access reviews and ensure that only authorized personnel or services have permissions to invoke cache operations. Implement monitoring and alerting on cache-related API calls to detect unusual or unauthorized activity promptly. If possible, apply application-layer authentication and authorization checks around the affected functions as a temporary workaround. Engage with the yeqifu project community to track any forthcoming patches or updates. Additionally, consider isolating the cache management service in a segmented network zone to reduce attack surface. Regularly audit logs and system behavior for anomalies related to cache manipulation. Finally, prepare incident response plans specific to cache integrity issues to minimize operational impact if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T09:00:44.984Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998c9e7be58cf853bab82aa

Added to database: 2/20/2026, 8:53:59 PM

Last enriched: 2/28/2026, 12:51:05 PM

Last updated: 4/7/2026, 8:29:38 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses