CVE-2026-2850: Improper Access Controls in yeqifu warehouse
A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addCustomer/updateCustomer/deleteCustomer of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\CustomerController.java of the component Customer Endpoint. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.
AI Analysis
Technical Summary
CVE-2026-2850 identifies an improper access control vulnerability within the yeqifu warehouse software, specifically in the CustomerController.java component that handles customer management functions (addCustomer, updateCustomer, deleteCustomer). The vulnerability allows remote attackers to perform unauthorized operations on customer data by exploiting insufficient access control checks in these API endpoints. The affected version is identified by a specific commit hash (aaf29962ba407d22d991781de28796ee7b4670e4), but due to the product's rolling release model, other versions may also be vulnerable. The CVSS 4.0 score of 5.3 reflects a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact includes limited confidentiality, integrity, and availability consequences, as attackers can manipulate customer records remotely. The vulnerability was responsibly disclosed but remains unpatched, and a public exploit exists, increasing the risk of exploitation. No known active exploitation campaigns have been reported to date. The lack of vendor response and patch availability necessitates immediate mitigation efforts by users of this software.
Potential Impact
The vulnerability allows unauthorized remote modification of customer data, which can lead to data integrity issues, unauthorized data disclosure, or denial of service through deletion or corruption of customer records. Organizations relying on yeqifu warehouse for customer management may face operational disruptions, loss of customer trust, and potential regulatory compliance violations if sensitive customer information is altered or exposed. The medium severity indicates that while the impact is not catastrophic, it is significant enough to warrant prompt attention, especially in environments where customer data integrity is critical. Attackers with network access and limited privileges can exploit this flaw without user interaction, increasing the attack surface. The absence of authentication bypass reduces the risk somewhat but does not eliminate the threat, particularly in multi-tenant or shared network environments.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict network segmentation to limit access to the Customer Endpoint APIs only to trusted internal systems and users. Employ strong authentication and authorization mechanisms to ensure that only authorized personnel can invoke addCustomer, updateCustomer, and deleteCustomer functions. Conduct thorough access control audits and code reviews to identify and remediate similar flaws in custom or integrated components. Monitor logs for unusual activity related to customer data operations and establish alerting for unauthorized access attempts. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block suspicious API calls targeting customer management endpoints. Engage with the vendor for updates and apply patches promptly once available. Additionally, implement data backup and recovery procedures to mitigate the impact of potential data manipulation or deletion.
Affected Countries
United States, China, Germany, United Kingdom, India, Japan, South Korea, France, Canada, Australia
CVE-2026-2850: Improper Access Controls in yeqifu warehouse
Description
A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addCustomer/updateCustomer/deleteCustomer of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\CustomerController.java of the component Customer Endpoint. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2850 identifies an improper access control vulnerability within the yeqifu warehouse software, specifically in the CustomerController.java component that handles customer management functions (addCustomer, updateCustomer, deleteCustomer). The vulnerability allows remote attackers to perform unauthorized operations on customer data by exploiting insufficient access control checks in these API endpoints. The affected version is identified by a specific commit hash (aaf29962ba407d22d991781de28796ee7b4670e4), but due to the product's rolling release model, other versions may also be vulnerable. The CVSS 4.0 score of 5.3 reflects a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and no user interaction (UI:N). The impact includes limited confidentiality, integrity, and availability consequences, as attackers can manipulate customer records remotely. The vulnerability was responsibly disclosed but remains unpatched, and a public exploit exists, increasing the risk of exploitation. No known active exploitation campaigns have been reported to date. The lack of vendor response and patch availability necessitates immediate mitigation efforts by users of this software.
Potential Impact
The vulnerability allows unauthorized remote modification of customer data, which can lead to data integrity issues, unauthorized data disclosure, or denial of service through deletion or corruption of customer records. Organizations relying on yeqifu warehouse for customer management may face operational disruptions, loss of customer trust, and potential regulatory compliance violations if sensitive customer information is altered or exposed. The medium severity indicates that while the impact is not catastrophic, it is significant enough to warrant prompt attention, especially in environments where customer data integrity is critical. Attackers with network access and limited privileges can exploit this flaw without user interaction, increasing the attack surface. The absence of authentication bypass reduces the risk somewhat but does not eliminate the threat, particularly in multi-tenant or shared network environments.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict network segmentation to limit access to the Customer Endpoint APIs only to trusted internal systems and users. Employ strong authentication and authorization mechanisms to ensure that only authorized personnel can invoke addCustomer, updateCustomer, and deleteCustomer functions. Conduct thorough access control audits and code reviews to identify and remediate similar flaws in custom or integrated components. Monitor logs for unusual activity related to customer data operations and establish alerting for unauthorized access attempts. Consider deploying Web Application Firewalls (WAFs) with rules tailored to detect and block suspicious API calls targeting customer management endpoints. Engage with the vendor for updates and apply patches promptly once available. Additionally, implement data backup and recovery procedures to mitigate the impact of potential data manipulation or deletion.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-20T09:00:49.391Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699899fe2c4d84f260b68111
Added to database: 2/20/2026, 5:29:34 PM
Last enriched: 2/28/2026, 2:29:08 PM
Last updated: 4/6/2026, 4:48:54 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.