A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
yeqifu warehouse Role-Permission Binding RoleController.java saveRolePermission access control
Problem type
Affected products
yeqifu
aaf29962ba407d22d991781de28796ee7b4670e4 - AFFECTED
References
https://vuldb.com/?id.344641
https://vuldb.com/?ctiid.344641
https://vuldb.com/?submit.745508
https://github.com/yeqifu/warehouse/issues/52
https://github.com/yeqifu/warehouse/issues/52#issue-3846645856
https://github.com/yeqifu/warehouse/
GitHub Security Advisories
GHSA-w9hx-x484-j26w
A security flaw has been discovered in yeqifu warehouse up to...
https://github.com/advisories/GHSA-w9hx-x484-j26wA security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
https://nvd.nist.gov/vuln/detail/CVE-2026-2075
https://github.com/yeqifu/warehouse/issues/52
https://github.com/yeqifu/warehouse/issues/52#issue-3846645856
https://github.com/yeqifu/warehouse
https://vuldb.com/?ctiid.344641
https://vuldb.com/?id.344641
https://vuldb.com/?submit.745508
https://github.com/advisories/GHSA-w9hx-x484-j26w
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-2075Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-2075",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-02-07T05:02:08.885Z",
"dateReserved": "2026-02-06T07:50:14.598Z",
"datePublished": "2026-02-07T05:02:08.885Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-02-07T05:02:08.885Z"
},
"title": "yeqifu warehouse Role-Permission Binding RoleController.java saveRolePermission access control",
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\\repos\\warehouse\\src\\main\\java\\com\\yeqifu\\sys\\controller\\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet."
}
],
"affected": [
{
"vendor": "yeqifu",
"product": "warehouse",
"modules": [
"Role-Permission Binding Handler"
],
"versions": [
{
"version": "aaf29962ba407d22d991781de28796ee7b4670e4",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Access Controls",
"cweId": "CWE-284",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Incorrect Privilege Assignment",
"cweId": "CWE-266",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.344641",
"name": "VDB-344641 | yeqifu warehouse Role-Permission Binding RoleController.java saveRolePermission access control",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.344641",
"name": "VDB-344641 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.745508",
"name": "Submit #745508 | yeqifu warehouse latest(git commit aaf29962ba407d22d991781de28796ee7b4670e4) Im",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/yeqifu/warehouse/issues/52",
"tags": [
"issue-tracking"
]
},
{
"url": "https://github.com/yeqifu/warehouse/issues/52#issue-3846645856",
"tags": [
"exploit",
"issue-tracking"
]
},
{
"url": "https://github.com/yeqifu/warehouse/",
"tags": [
"product"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2026-02-06T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-02-06T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-02-06T08:55:22.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "AliceS614 (VulDB User)",
"type": "reporter"
}
]
}
}
}