CVE-2026-2105
📋 TL;DR
This CVE-2026-2105 vulnerability allows unauthorized users to manipulate department management functions (add, update, delete) in yeqifu warehouse software due to improper authorization checks. Attackers can exploit this remotely to modify organizational structures without proper permissions. All deployments using affected versions of yeqifu warehouse are vulnerable.
💻 Affected Systems
- yeqifu warehouse
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could completely restructure organizational departments, delete critical departments, or create malicious departments to disrupt business operations and access control systems.
Likely Case
Unauthorized users gain department management privileges, allowing them to modify organizational structures, potentially leading to privilege escalation or business process disruption.
If Mitigated
With proper network segmentation and authentication controls, impact would be limited to authorized users only, preventing external exploitation.
🎯 Exploit Status
Exploit details are publicly available in GitHub issues. Attack requires some authentication but bypasses authorization checks for department management functions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not available
Restart Required: Yes
Instructions:
1. Monitor GitHub repository for security patches
2. Apply any security updates when available
3. Restart the warehouse application after patching
🔧 Temporary Workarounds
Network Access Restriction
allRestrict network access to the warehouse application to trusted networks only
Authentication Enhancement
allImplement additional authentication layers or rate limiting on department management endpoints
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to the warehouse application
- Add application-level authorization checks or web application firewall rules to block unauthorized department management requests
🔍 How to Verify
Check if Vulnerable:
Check if your deployment uses yeqifu warehouse code from commit aaf29962ba407d22d991781de28796ee7b4670e4 or earlier
Check Version:
git log --oneline -1
Verify Fix Applied:
Verify that authorization checks are properly implemented in DeptController.java for addDept, updateDept, and deleteDept functions
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to /dept endpoints
- Multiple department modification requests from single user
- Department changes from non-admin users
Network Indicators:
- HTTP POST/PUT/DELETE requests to department management endpoints from unauthorized sources
SIEM Query:
source="warehouse" AND (uri_path="/dept/add" OR uri_path="/dept/update" OR uri_path="/dept/delete") AND user_role!="admin"