CVE-2026-2075
Published: 07 February 2026
Summary
CVE-2026-2075 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Yeqifu Warehouse. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.
Supervision and review of access control activities directly detects and remediates improper access configurations or usages.
Defining account types, requiring approvals for creation, specifying authorizations, monitoring usage, and reviewing accounts directly prevents improper access control by ensuring only authorized accounts exist and are used.
The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.
Ensures privileges are assigned only as necessary rather than incorrectly over-granted.
Device lock enforces restricted access until re-authentication, directly reducing unauthorized use of active sessions.
Explicitly identifying and documenting actions permitted without identification or authentication enforces proper access control boundaries by defining justified exceptions.
By automatically labeling outputs with security attributes, the control supports attribute-based enforcement and reduces exploitability of improper access control weaknesses.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Improper access control in a public-facing web app controller (saveRolePermission) directly enables remote exploitation of a public-facing application (T1190) and facilitates privilege escalation by unauthorized role/permission modification (T1068).
NVD Description
A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the…
more
attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-2075 is an improper access control vulnerability (CWE-266, CWE-284) in the yeqifu warehouse project, specifically affecting the saveRolePermission function in the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java within the Role-Permission Binding Handler component. It impacts the project up to commit aaf29962ba407d22d991781de28796ee7b4670e4. The project follows a rolling release model, so precise version details for affected or updated releases are unavailable.
The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L) by an attacker possessing low privileges (PR:L) and without requiring user interaction (UI:N), resulting in unchanged scope (S:U). Successful attacks yield low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), earning a CVSS 3.1 base score of 6.3. A public exploit is available for use in attacks.
Advisories note that the project was informed early via GitHub issue #52 but has not responded. No patches or mitigations are detailed due to the rolling release approach. Relevant references include the yeqifu/warehouse GitHub repository, issue #52 (including comment #3846645856), and VulDB entries at ctiid.344641 and id.344641.
Details
- CWE(s)