CVE-2026-2075

6.3 MEDIUM

📋 TL;DR

This CVE describes an improper access control vulnerability in yeqifu warehouse's role-permission binding handler. Attackers can remotely exploit this flaw to manipulate role permissions, potentially gaining unauthorized access to system functions. All deployments using affected versions are vulnerable until patched.

💻 Affected Systems

Products:
  • yeqifu warehouse
Versions: All versions up to commit aaf29962ba407d22d991781de28796ee7b4670e4
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: The project uses rolling releases, so specific version numbers aren't available. All deployments using code before the fix commit are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could escalate privileges to administrative levels, modify all user permissions, and gain complete control over the warehouse system.

🟠

Likely Case

Attackers will modify role permissions to gain unauthorized access to sensitive data and administrative functions they shouldn't have.

🟢

If Mitigated

With proper network segmentation and least privilege principles, impact would be limited to the affected application component.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely and a public exploit exists, making internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this to escalate privileges within the application.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The exploit has been released publicly and targets a specific function (saveRolePermission) with improper access controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - vendor has not responded

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Monitor the GitHub repository for updates 2. Apply any security patches when released 3. Restart the application after patching

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to the warehouse application to trusted IPs only

# Use firewall rules to restrict access
# Example: iptables -A INPUT -p tcp --dport [APP_PORT] -s [TRUSTED_IP] -j ACCEPT
# iptables -A INPUT -p tcp --dport [APP_PORT] -j DROP

Application Firewall Rules

all

Implement WAF rules to block suspicious role-permission modification requests

# Configure WAF to block requests to /sys/role/* with suspicious parameters
# Example ModSecurity rule: SecRule REQUEST_URI "@rx ^/sys/role/" "id:1001,phase:2,deny"

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the warehouse application
  • Enable detailed audit logging for all role-permission modification attempts and monitor for anomalies

🔍 How to Verify

Check if Vulnerable:

Check if your deployment uses code from commit aaf29962ba407d22d991781de28796ee7b4670e4 or earlier by examining git history or build artifacts

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify the fix by checking that the saveRolePermission function now implements proper authorization checks before allowing modifications

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized role permission modification attempts
  • Multiple failed authorization checks for saveRolePermission function
  • Suspicious user activity from unexpected sources

Network Indicators:

  • Unusual HTTP POST requests to /sys/role/* endpoints
  • Requests attempting to modify permissions without proper authentication headers

SIEM Query:

source="warehouse_logs" AND (uri_path="/sys/role/*" AND http_method="POST") AND (user_role!="admin" OR auth_success="false")

🔗 References

📤 Share & Export