CVE-2026-0574
Published: 04 January 2026
Summary
CVE-2026-0574 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Yeqifu Warehouse. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 19.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Documented procedures facilitate correct implementation and ongoing management of authorization decisions.
Periodic reviews identify and correct flaws in authorization decisions or enforcement.
Specifying access authorizations for each account and requiring approvals for account requests enforces proper authorization decisions.
The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.
Ensures privileges are assigned only as necessary rather than incorrectly over-granted.
The control's documentation requirement reduces improper authorization by ensuring only mission-justified actions bypass authentication.
Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.
Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper authorization in saveUserRole directly enables vertical privilege escalation via exploitation of the vulnerability.
NVD Description
A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function saveUserRole of the file warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component Request Handler. This manipulation causes improper authorization. The attack is possible to be carried out remotely. The…
more
exploit has been made available to the public and could be used for attacks. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.
Deeper analysisAI
CVE-2026-0574 is an improper authorization vulnerability in the yeqifu warehouse project, affecting versions up to commit aaf29962ba407d22d991781de28796ee7b4670e4. The weakness is located in the saveUserRole function of the file warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java within the Request Handler component. Published on 2026-01-04, it is associated with CWEs CWE-266 and CWE-285, and carries a CVSS v3.1 base score of 6.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
The vulnerability enables remote exploitation by an authenticated attacker with low privileges. Exploitation of the saveUserRole function allows vertical privilege escalation, potentially granting unauthorized access to elevate user roles and resulting in low-level impacts to confidentiality, integrity, and availability.
Advisories referenced in GitHub repositories detail the vertical privilege escalation vulnerability and provide a public proof-of-concept exploit. VulDB entries confirm the remote attack vector and public availability of the exploit. The project employs a rolling release strategy for continuous delivery, preventing specification of exact affected or patched versions, with no further mitigation details outlined in the sources.
Details
- CWE(s)