Cyber Posture

CVE-2026-2075

MediumPublic PoC

Published: 07 February 2026

Published
07 February 2026
Modified
10 February 2026
KEV Added
Patch
CVSS Score 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0004 12.1th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-2075 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Yeqifu Warehouse. Its CVSS base score is 6.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-284 CWE-266

The access control policy and procedures directly mandate and enforce proper access control mechanisms across the organization.

addresses: CWE-284 CWE-266

Supervision and review of access control activities directly detects and remediates improper access configurations or usages.

addresses: CWE-284 CWE-266

Defining account types, requiring approvals for creation, specifying authorizations, monitoring usage, and reviewing accounts directly prevents improper access control by ensuring only authorized accounts exist and are used.

addresses: CWE-266 CWE-284

The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.

addresses: CWE-266 CWE-284

Ensures privileges are assigned only as necessary rather than incorrectly over-granted.

addresses: CWE-284

Device lock enforces restricted access until re-authentication, directly reducing unauthorized use of active sessions.

addresses: CWE-284

Explicitly identifying and documenting actions permitted without identification or authentication enforces proper access control boundaries by defining justified exceptions.

addresses: CWE-284

By automatically labeling outputs with security attributes, the control supports attribute-based enforcement and reduces exploitability of improper access control weaknesses.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Improper access control in a public-facing web app controller (saveRolePermission) directly enables remote exploitation of a public-facing application (T1190) and facilitates privilege escalation by unauthorized role/permission modification (T1068).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected is the function saveRolePermission of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java of the component Role-Permission Binding Handler. The manipulation results in improper access controls. It is possible to launch the…

more

attack remotely. The exploit has been released to the public and may be used for attacks. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-2075 is an improper access control vulnerability (CWE-266, CWE-284) in the yeqifu warehouse project, specifically affecting the saveRolePermission function in the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\RoleController.java within the Role-Permission Binding Handler component. It impacts the project up to commit aaf29962ba407d22d991781de28796ee7b4670e4. The project follows a rolling release model, so precise version details for affected or updated releases are unavailable.

The vulnerability enables remote exploitation over the network (AV:N) with low attack complexity (AC:L) by an attacker possessing low privileges (PR:L) and without requiring user interaction (UI:N), resulting in unchanged scope (S:U). Successful attacks yield low impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), earning a CVSS 3.1 base score of 6.3. A public exploit is available for use in attacks.

Advisories note that the project was informed early via GitHub issue #52 but has not responded. No patches or mitigations are detailed due to the rolling release approach. Relevant references include the yeqifu/warehouse GitHub repository, issue #52 (including comment #3846645856), and VulDB entries at ctiid.344641 and id.344641.

Details

CWE(s)

Affected Products

yeqifu
warehouse
≤ 2025-10-06

CVEs Like This One

CVE-2026-2078Same product: Yeqifu Warehouse
CVE-2026-2105Same product: Yeqifu Warehouse
CVE-2026-2079Same product: Yeqifu Warehouse
CVE-2026-0574Same product: Yeqifu Warehouse
CVE-2026-2106Same product: Yeqifu Warehouse
CVE-2026-2077Same product: Yeqifu Warehouse
CVE-2026-2107Same product: Yeqifu Warehouse
CVE-2026-2076Same product: Yeqifu Warehouse
CVE-2024-13200Shared CWE-266, CWE-284
CVE-2025-15432Same vendor: Yeqifu

References