A security vulnerability has been detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function addRole/updateRole/deleteRole of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role Management Handler. Such manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.
yeqifu warehouse Role Management RoleController.java deleteRole improper authorization
Problem type
Affected products
yeqifu
aaf29962ba407d22d991781de28796ee7b4670e4 - AFFECTED
References
https://vuldb.com/?id.344643
https://vuldb.com/?ctiid.344643
https://vuldb.com/?submit.745512
https://github.com/yeqifu/warehouse/issues/54
https://github.com/yeqifu/warehouse/issues/54#issue-3846654129
https://github.com/yeqifu/warehouse/
GitHub Security Advisories
GHSA-88w4-2phc-29cp
A security vulnerability has been detected in yeqifu warehouse up to...
https://github.com/advisories/GHSA-88w4-2phc-29cpA security vulnerability has been detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function addRole/updateRole/deleteRole of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role Management Handler. Such manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.
https://nvd.nist.gov/vuln/detail/CVE-2026-2077
https://github.com/yeqifu/warehouse/issues/54
https://github.com/yeqifu/warehouse/issues/54#issue-3846654129
https://github.com/yeqifu/warehouse
https://vuldb.com/?ctiid.344643
https://vuldb.com/?id.344643
https://vuldb.com/?submit.745512
https://github.com/advisories/GHSA-88w4-2phc-29cp
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-2077Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-2077",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-02-07T07:32:07.498Z",
"dateReserved": "2026-02-06T07:57:14.674Z",
"datePublished": "2026-02-07T07:32:07.498Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-02-07T07:32:07.498Z"
},
"title": "yeqifu warehouse Role Management RoleController.java deleteRole improper authorization",
"descriptions": [
{
"lang": "en",
"value": "A security vulnerability has been detected in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function addRole/updateRole/deleteRole of the file dataset\\repos\\warehouse\\src\\main\\java\\com\\yeqifu\\sys\\controller\\RoleController.java of the component Role Management Handler. Such manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet."
}
],
"affected": [
{
"vendor": "yeqifu",
"product": "warehouse",
"modules": [
"Role Management Handler"
],
"versions": [
{
"version": "aaf29962ba407d22d991781de28796ee7b4670e4",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Authorization",
"cweId": "CWE-285",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Incorrect Privilege Assignment",
"cweId": "CWE-266",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.344643",
"name": "VDB-344643 | yeqifu warehouse Role Management RoleController.java deleteRole improper authorization",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.344643",
"name": "VDB-344643 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.745512",
"name": "Submit #745512 | yeqifu warehouse latest(git commit aaf29962ba407d22d991781de28796ee7b4670e4) Improper Access Controls",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/yeqifu/warehouse/issues/54",
"tags": [
"issue-tracking"
]
},
{
"url": "https://github.com/yeqifu/warehouse/issues/54#issue-3846654129",
"tags": [
"exploit",
"issue-tracking"
]
},
{
"url": "https://github.com/yeqifu/warehouse/",
"tags": [
"product"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2026-02-06T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-02-06T01:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-02-06T09:02:27.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "AliceS614 (VulDB User)",
"type": "reporter"
}
]
}
}
}