Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2850: Improper Access Controls in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2850cvecve-2026-2850
Published: Fri Feb 20 2026 (02/20/2026, 17:02:07 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addCustomer/updateCustomer/deleteCustomer of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\CustomerController.java of the component Customer Endpoint. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:29:08 UTC

Technical Analysis

CVE-2026-2850 identifies an improper access control vulnerability within the yeqifu warehouse software, specifically in the CustomerController.java component that handles customer management functions (addCustomer, updateCustomer, deleteCustomer). The vulnerability allows remote attackers to perform unauthorized operations on customer data by exploiting insufficient access control checks in these API endpoints. The affected version is identified by a specific commit hash (aaf29962ba407d22d991781de28796ee7b4670e4), but due to the product's rolling release model, other versions may also be vulnerable. The CVSS 4.0 score of 5.3 reflects a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact includes limited confidentiality, integrity, and availability consequences, as attackers can manipulate customer records remotely. The vulnerability was responsibly disclosed but remains unpatched, and a public exploit exists, increasing the risk of exploitation. No known active exploitation campaigns have been reported to date. The lack of vendor response and patch availability necessitates immediate mitigation efforts by users of this software.

Potential Impact

The vulnerability allows unauthorized remote modification of customer data, which can lead to data integrity issues, unauthorized data disclosure, or denial of service through deletion or corruption of customer records. Organizations relying on yeqifu warehouse for customer management may face operational disruptions, loss of customer trust, and potential regulatory compliance violations if sensitive customer information is altered or exposed. The medium severity indicates that while the impact is not catastrophic, it is significant enough to warrant prompt attention, especially in environments where customer data integrity is critical. Attackers with network access and limited privileges can exploit this flaw without user interaction, increasing the attack surface. The absence of authentication bypass reduces the risk somewhat but does not eliminate the threat, particularly in multi-tenant or shared network environments.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation to limit access to the Customer Endpoint APIs only to trusted internal systems and users. Employ strong authentication and authorization mechanisms to ensure that only authorized personnel can invoke addCustomer, updateCustomer, and deleteCustomer functions. Conduct thorough access control audits and code reviews to identify and remediate similar flaws in custom or integrated components. Monitor logs for unusual activity related to customer data operations and establish alerting for unauthorized access attempts. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block suspicious API calls targeting customer management endpoints. Engage with the vendor for updates and apply patches promptly once available. Additionally, implement data backup and recovery procedures to mitigate the impact of potential data manipulation or deletion.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T09:00:49.391Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699899fe2c4d84f260b68111

Added to database: 2/20/2026, 5:29:34 PM

Last enriched: 2/28/2026, 2:29:08 PM

Last updated: 4/6/2026, 4:48:54 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses