CVE-2026-2079

6.3 MEDIUM

📋 TL;DR

This CVE describes an improper authorization vulnerability in yeqifu warehouse's menu management functions (addMenu/updateMenu/deleteMenu). Attackers can remotely manipulate menu operations without proper permissions, potentially modifying system menus. All deployments using affected commits are vulnerable.

💻 Affected Systems

Products:
  • yeqifu warehouse
Versions: All versions up to commit aaf29962ba407d22d991781de28796ee7b4670e4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Rolling release model means no specific version numbers; vulnerability exists in all deployments using affected code commits.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized attackers could modify or delete critical system menus, potentially disrupting application functionality or creating backdoors for further attacks.

🟠

Likely Case

Attackers gain unauthorized access to modify menu structures, potentially altering user interfaces or creating misleading navigation.

🟢

If Mitigated

With proper authorization controls, only authenticated users with appropriate roles can modify menus, limiting impact to authorized changes.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details published in GitHub issues; requires some authentication but bypasses authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Monitor GitHub repository for security patches. 2. Apply any security updates when available. 3. Restart application after patching.

🔧 Temporary Workarounds

Implement authorization middleware

all

Add proper role-based access control checks before menu operations

Implement authorization checks in MenuController.java methods

Disable menu management endpoints

all

Temporarily disable addMenu/updateMenu/deleteMenu endpoints if not critical

Comment out or remove @RequestMapping annotations for affected methods

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to menu management endpoints
  • Deploy web application firewall with rules to detect unauthorized menu operations

🔍 How to Verify

Check if Vulnerable:

Check if current deployment uses commit aaf29962ba407d22d991781de28796ee7b4670e4 or earlier in the warehouse repository

Check Version:

git log --oneline -1

Verify Fix Applied:

Verify authorization checks are implemented in MenuController.java methods and test with unauthorized user accounts

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /menu endpoints
  • Menu modifications from unexpected user accounts

Network Indicators:

  • HTTP POST/PUT/DELETE requests to menu endpoints without proper authorization headers

SIEM Query:

source="application.log" AND (uri="/menu/add" OR uri="/menu/update" OR uri="/menu/delete") AND user.role!="admin"

🔗 References

📤 Share & Export