Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2852: Improper Access Controls in yeqifu warehouse

0
Medium
VulnerabilityCVE-2026-2852cvecve-2026-2852
Published: Fri Feb 20 2026 (02/20/2026, 18:32:07 UTC)
Source: CVE Database V5
Vendor/Project: yeqifu
Product: warehouse

Description

A vulnerability was identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This issue affects the function addSales/updateSales/deleteSales of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\SalesController.java of the component Sales Endpoint. The manipulation leads to improper access controls. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:48:28 UTC

Technical Analysis

CVE-2026-2852 identifies an improper access control vulnerability in the yeqifu warehouse software, specifically within the SalesController.java file's addSales, updateSales, and deleteSales functions. These functions are responsible for managing sales data through the Sales Endpoint component. Due to insufficient authorization checks, attackers with limited privileges can remotely invoke these functions to add, modify, or delete sales records without proper permissions. The vulnerability is exploitable over the network without requiring user interaction or elevated privileges beyond limited access, increasing its risk profile. The yeqifu warehouse product follows a rolling release strategy, which means that affected versions are continuously updated, making it difficult to pinpoint exact vulnerable versions or patches. The vulnerability was responsibly disclosed early but remains unpatched as of the publication date. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the moderate impact on confidentiality, integrity, and availability, with ease of exploitation and no user interaction needed. No known exploits in the wild have been reported yet, but a public exploit exists, increasing the urgency for mitigation.

Potential Impact

This vulnerability can lead to unauthorized manipulation of sales data, impacting data integrity and potentially availability of sales records. Attackers could add fraudulent sales entries, alter existing sales data, or delete critical sales information, which can disrupt business operations, financial reporting, and inventory management. The improper access controls could also lead to loss of trust in the system's data accuracy, regulatory compliance issues, and financial losses. Since the exploit can be performed remotely without user interaction, attackers can automate attacks at scale, increasing the risk for organizations relying on yeqifu warehouse for sales management. The medium severity rating indicates a moderate but tangible risk that could escalate if combined with other vulnerabilities or insider threats.

Mitigation Recommendations

Organizations should immediately audit and strengthen access control mechanisms on the SalesController endpoints (addSales, updateSales, deleteSales). Implement strict authorization checks ensuring only properly authenticated and authorized users can perform sales data modifications. Employ role-based access control (RBAC) or attribute-based access control (ABAC) to limit access to these functions. Monitor logs for unusual activity related to sales data changes. If possible, isolate the sales management interfaces behind additional network controls such as VPNs or IP whitelisting. Engage with the yeqifu project or vendor to obtain patches or updates as they become available. In the interim, consider implementing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting these endpoints. Regularly review and update security policies and conduct penetration testing focused on access control weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T09:00:55.867Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998c9e4be58cf853bab7605

Added to database: 2/20/2026, 8:53:56 PM

Last enriched: 2/28/2026, 12:48:28 PM

Last updated: 4/7/2026, 8:29:08 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses