CVE-2026-2105
Published: 07 February 2026
Summary
CVE-2026-2105 is a medium-severity Incorrect Privilege Assignment (CWE-266) vulnerability in Yeqifu Warehouse. Its CVSS base score is 6.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Documented procedures facilitate correct implementation and ongoing management of authorization decisions.
Periodic reviews identify and correct flaws in authorization decisions or enforcement.
Specifying access authorizations for each account and requiring approvals for account requests enforces proper authorization decisions.
The control requires explicit definition of separated access authorizations, making incorrect privilege assignments that bundle conflicting duties harder to implement.
Ensures privileges are assigned only as necessary rather than incorrectly over-granted.
The control's documentation requirement reduces improper authorization by ensuring only mission-justified actions bypass authentication.
Establishing permitted attributes and values, plus auditing changes, ensures authorization decisions are based on correctly managed policy data.
Explicitly mandates authorizing remote access types before permitting connections, directly mitigating improper authorization.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote network-exploitable improper authorization in a web app controller directly enables exploitation of public-facing applications (T1190).
NVD Description
A flaw has been found in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. The affected element is the function addDept/updateDept/deleteDept of the file dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\DeptController.java of the component Department Management. Executing a manipulation can lead to improper authorization. It is possible to launch…
more
the attack remotely. The exploit has been published and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-2105 is an improper authorization vulnerability in the yeqifu warehouse project, affecting commits up to aaf29962ba407d22d991781de28796ee7b4670e4. The flaw resides in the addDept, updateDept, and deleteDept functions within the DeptController.java file, part of the Department Management component located at dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\DeptController.java. This open-source project employs rolling releases for continuous delivery, so specific affected and patched version details are unavailable.
The vulnerability can be exploited remotely over the network with low complexity and low privileges (PR:L), requiring no user interaction. An attacker with basic authenticated access can manipulate these department management functions, potentially leading to limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L), as scored at CVSS 3.1 level 6.3. Associated CWEs include CWE-266 (Incorrect Privilege Assignment) and CWE-285 (Improper Authorization).
Advisories from VulDB and the project's GitHub repository (issues #57 and related comment #3846662068) indicate that an exploit has been published and is available for use. The project was notified early via an issue report but has not yet responded or issued mitigations. Security practitioners should monitor the repository at https://github.com/yeqifu/warehouse/ for updates, restrict access to the affected endpoints, and consider disabling or isolating the Department Management component until a fix is confirmed.
Notable context includes the public availability of the exploit, increasing the risk of immediate abuse in exposed instances, though no widespread real-world exploitation has been reported as of the CVE publication on 2026-02-07.
Details
- CWE(s)