CVE-2026-2106

6.3 MEDIUM

📋 TL;DR

This CVE describes an improper authorization vulnerability in the Notice Management component of yeqifu warehouse software. Attackers can remotely exploit functions like addNotice, updateNotice, deleteNotice, and batchDeleteNotice to perform unauthorized operations. All users running affected versions of yeqifu warehouse are impacted.

💻 Affected Systems

Products:
  • yeqifu warehouse
Versions: All versions up to commit aaf29962ba407d22d991781de28796ee7b4670e4
Operating Systems: Any OS running Java applications
Default Config Vulnerable: ⚠️ Yes
Notes: Continuous delivery with rolling releases means no specific version numbers are available. All deployments using the vulnerable code are affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete or modify all system notices, potentially disrupting operations or injecting malicious content that users might trust.

🟠

Likely Case

Unauthorized users could create, modify, or delete notices, leading to misinformation, operational confusion, or defacement.

🟢

If Mitigated

With proper authorization controls, only authenticated users with appropriate permissions could access notice management functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details have been publicly disclosed in GitHub issues. The vulnerability is in controller functions that lack proper authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

1. Monitor the GitHub repository for updates. 2. Apply any security patches when released. 3. Restart the application after patching.

🔧 Temporary Workarounds

Implement authorization middleware

all

Add proper authorization checks before notice management functions execute

# Requires code modification in NoticeController.java

Disable notice management endpoints

linux

Temporarily block access to /notice/* endpoints via web application firewall or reverse proxy

# Example nginx location block:
location ~ ^/notice/ { deny all; }

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to the warehouse application
  • Deploy a web application firewall with rules to detect and block unauthorized notice management requests

🔍 How to Verify

Check if Vulnerable:

Check if your codebase includes the vulnerable commit aaf29962ba407d22d991781de28796ee7b4670e4 or earlier versions of NoticeController.java

Check Version:

git log --oneline | head -20

Verify Fix Applied:

Verify that authorization checks have been added to addNotice, updateNotice, deleteNotice, and batchDeleteNotice methods

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST/PUT/DELETE requests to /notice/* endpoints
  • Notice creation/modification/deletion from unexpected user accounts or IPs

Network Indicators:

  • HTTP requests to notice management endpoints without proper authentication headers
  • Unusual patterns of notice-related API calls

SIEM Query:

source="application.log" AND (uri_path="/notice/add" OR uri_path="/notice/update" OR uri_path="/notice/delete") AND NOT user_role="admin"

🔗 References

📤 Share & Export