CVE-2026-0574

6.3 MEDIUM

📋 TL;DR

This CVE describes an improper authorization vulnerability in the yeqifu warehouse software that allows vertical privilege escalation. Attackers can remotely exploit the saveUserRole function to gain unauthorized administrative privileges. All deployments using affected versions are vulnerable.

💻 Affected Systems

Products:
  • yeqifu warehouse
Versions: Up to commit aaf29962ba407d22d991781de28796ee7b4670e4 (rolling release, no specific version numbers)
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using the vulnerable code. The product uses rolling releases, making version tracking difficult.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative access, modify user roles, access sensitive data, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized privilege escalation allowing attackers to modify user permissions, access restricted functionality, and potentially exfiltrate sensitive data.

🟢

If Mitigated

Limited impact with proper network segmentation, strong authentication, and monitoring detecting unauthorized role changes.

🌐 Internet-Facing: HIGH - Remote exploitation is possible and public exploit exists, making internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires some authentication but allows privilege escalation. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None found

Restart Required: Yes

Instructions:

1. Check for updates from the yeqifu warehouse repository
2. Apply the latest version if available
3. Restart the application
4. Verify the saveUserRole function has proper authorization checks

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to the warehouse application to trusted networks only

Web Application Firewall Rules

all

Implement WAF rules to block requests attempting to modify user roles without proper authorization

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the warehouse application
  • Enhance monitoring for unauthorized role modification attempts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check if your deployment uses code from commit aaf29962ba407d22d991781de28796ee7b4670e4 or earlier in the UserController.java file

Check Version:

Check git commit history or build metadata for the application version

Verify Fix Applied:

Verify the saveUserRole function includes proper authorization checks and role validation

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized role modification attempts
  • User privilege escalation events
  • Failed authorization checks for saveUserRole function

Network Indicators:

  • HTTP POST requests to user role modification endpoints from unauthorized sources

SIEM Query:

source="warehouse" AND (event="role_modification" OR event="privilege_escalation") AND result="success" AND user_role!="admin"

🔗 References

📤 Share & Export