Description
A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function saveUserRole of the file warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component Request Handler. This manipulation causes improper authorization. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.
Published: 2026-01-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Now
AI Analysis

Impact

The flaw originates in the saveUserRole function of the UserController, where role assignments are handled without adequate authorization checks. An attacker can craft a request to assign arbitrary roles to users, enabling privileged actions beyond their intended scope. This results in vertical privilege escalation, potentially compromising the entire system.

Affected Systems

Yeqifu warehouse is affected in all releases up to commit aaf29962ba407d22d991781de28796ee7b4670e4. The project uses a rolling release model, so the exact version of a fixed release is not specified. All deployments of the software that include the vulnerable function are susceptible.

Risk and Exploitability

The CVSS score is 5.3, indicating moderate severity, while the EPSS score is less than 1%, suggesting a low probability of exploitation in the wild. The vulnerability can be triggered remotely by sending a specially crafted HTTP request to the /saveUserRole endpoint, and because the public exploit is available, an attacker could deploy this attack quickly.

Generated by OpenCVE AI on April 18, 2026 at 08:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify and deploy the latest release of yeqifu warehouse once a vendor fix is released. The product’s rolling release strategy may mean the fix is merged into the main branch, so monitor the repository for new commits.
  • Restrict the /saveUserRole endpoint so that only users with sufficient privileges can call it, enforcing role‑based access control and removing any default or guest access paths.
  • Apply network‑level controls to limit exposure of the endpoint, such as firewall rules, reverse proxy authentication, or IP whitelisting to reduce the surface area for remote exploitation.

Generated by OpenCVE AI on April 18, 2026 at 08:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Yeqifu warehouse
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:yeqifu:warehouse:*:*:*:*:*:*:*:*
Vendors & Products Yeqifu warehouse

Tue, 06 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Yeqifu
Yeqifu warehouse Management System
Vendors & Products Yeqifu
Yeqifu warehouse Management System

Sun, 04 Jan 2026 02:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This affects the function saveUserRole of the file warehouse\src\main\java\com\yeqifu\sys\controller\UserController.java of the component Request Handler. This manipulation causes improper authorization. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified.
Title yeqifu warehouse Request UserController.java saveUserRole improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Yeqifu Warehouse Warehouse Management System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:11:31.730Z

Reserved: 2026-01-03T08:58:17.741Z

Link: CVE-2026-0574

cve-icon Vulnrichment

Updated: 2026-01-06T20:37:31.499Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-04T02:15:41.690

Modified: 2026-02-17T19:24:21.260

Link: CVE-2026-0574

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z