Home

Description

A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this vulnerability is the function addUser/updateUser/deleteUser of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component User Management Endpoint. This manipulation causes improper authorization. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.

PUBLISHED Reserved 2026-02-06 | Published 2026-02-07 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

Improper Authorization

Incorrect Privilege Assignment

Product status

aaf29962ba407d22d991781de28796ee7b4670e4
affected

Timeline

2026-02-06:Advisory disclosed
2026-02-06:VulDB entry created
2026-02-10:VulDB entry last update

Credits

AliceS614 (VulDB User) reporter

References

vuldb.com/?id.344642 (VDB-344642 | yeqifu warehouse User Management Endpoint UserController.java deleteUser improper authorization) vdb-entry technical-description

vuldb.com/?ctiid.344642 (VDB-344642 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/?submit.745509 (Submit #745509 | yeqifu warehouse latest(git commit aaf29962ba407d22d991781de28796ee7b4670e4) Improper Access Controls) third-party-advisory

github.com/yeqifu/warehouse/issues/53 issue-tracking

github.com/yeqifu/warehouse/issues/53 exploit issue-tracking

github.com/yeqifu/warehouse/ product

cve.org (CVE-2026-2076)

nvd.nist.gov (CVE-2026-2076)

Download JSON