Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2850: Improper Access Controls in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2850cvecve-2026-2850
Published: Fri Feb 20 2026 (02/20/2026, 17:02:07 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A vulnerability was found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function addCustomer/updateCustomer/deleteCustomer of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\CustomerController.java of the component Customer Endpoint. Performing a manipulation results in improper access controls. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 02/20/2026, 17:44:15 UTC

Technical Analysis

CVE-2026-2850 identifies an improper access control vulnerability in the yeqifu warehouse software, specifically within the CustomerController.java file's addCustomer, updateCustomer, and deleteCustomer functions. These functions are part of the Customer Endpoint component responsible for managing customer data. The vulnerability allows remote attackers to perform unauthorized operations on customer records due to insufficient access control checks. The exploit does not require user interaction and can be executed remotely with low privileges, increasing the attack surface. The product follows a rolling release model, which means affected versions are not clearly delineated, complicating patch management and vulnerability mitigation. The vulnerability was responsibly disclosed but remains unpatched as of the publication date. The CVSS 4.0 base score is 5.3 (medium), reflecting moderate impact on confidentiality, integrity, and availability, with ease of exploitation. No known exploits are currently observed in the wild, but public exploit code is available, raising the risk of future attacks.

Potential Impact

If exploited, this vulnerability could allow attackers to manipulate customer data by adding, updating, or deleting records without proper authorization. This compromises data integrity and confidentiality, potentially leading to unauthorized data disclosure, data corruption, or denial of service if critical customer data is deleted or altered. Organizations relying on yeqifu warehouse for customer management may face operational disruptions, reputational damage, and regulatory compliance issues due to unauthorized data manipulation. The ease of remote exploitation without user interaction or elevated privileges increases the likelihood of attacks, especially in environments with exposed or poorly segmented network access. The rolling release deployment model may delay patch application, prolonging exposure. Overall, the vulnerability poses a moderate risk to organizations handling sensitive customer information through this platform.

Mitigation Recommendations

1. Immediately audit and restrict access controls on the Customer Endpoint functions (addCustomer, updateCustomer, deleteCustomer) to ensure only authorized users can perform these operations. 2. Implement strict authentication and authorization checks at the application layer, including role-based access control (RBAC) or attribute-based access control (ABAC) mechanisms. 3. Employ network segmentation and firewall rules to limit external access to the yeqifu warehouse management interfaces. 4. Monitor logs for unusual activity related to customer data manipulation, such as unexpected additions, updates, or deletions. 5. If possible, deploy Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting these endpoints. 6. Engage with the yeqifu project maintainers to obtain patches or updates and apply them promptly once available. 7. Consider implementing multi-factor authentication (MFA) for users with access to customer management functions to reduce risk from compromised credentials. 8. Conduct regular security assessments and code reviews focusing on access control enforcement in critical application components. 9. Maintain an incident response plan to quickly address any exploitation attempts or breaches related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T09:00:49.391Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699899fe2c4d84f260b68111

Added to database: 2/20/2026, 5:29:34 PM

Last enriched: 2/20/2026, 5:44:15 PM

Last updated: 2/20/2026, 8:56:26 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats