Home

Description

A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function createResponseEntity of the file warehouse\src\main\java\com\yeqifu\sys\common\AppFileUtils.java. The manipulation of the argument path results in path traversal. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.

PUBLISHED Reserved 2026-01-02 | Published 2026-01-02 | Updated 2026-01-06 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
MEDIUM: 4.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
4.0AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Path Traversal

Product status

aaf29962ba407d22d991781de28796ee7b4670e4
affected

Timeline

2026-01-02:Advisory disclosed
2026-01-02:VulDB entry created
2026-01-02:VulDB entry last update

Credits

5i1encee (VulDB User) reporter

References

github.com/...d Vulnerability in Project yeqifu warehouse.md exploit

vuldb.com/?id.339385 (VDB-339385 | yeqifu warehouse AppFileUtils.java createResponseEntity path traversal) vdb-entry technical-description

vuldb.com/?ctiid.339385 (VDB-339385 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.729331 (Submit #729331 | yeqifu warehouse aaf29962ba407d22d991781de28796ee7b4670e4 Arbitrary File Read) third-party-advisory

github.com/...d Vulnerability in Project yeqifu warehouse.md related

github.com/...d Vulnerability in Project yeqifu warehouse.md exploit

cve.org (CVE-2026-0571)

nvd.nist.gov (CVE-2026-0571)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.