CVE-2026-2078 Overview
A vulnerability has been identified in the Yeqifu Warehouse application affecting the Permission Management component. This improper authorization flaw exists in the addPermission, updatePermission, and deletePermission functions within the PermissionController.java file. The vulnerability allows remote attackers to manipulate permission settings due to insufficient authorization checks, potentially leading to unauthorized access to sensitive functionality.
Critical Impact
Remote attackers with low privileges can exploit improper authorization controls in the Permission Management component to manipulate permission settings, potentially escalating privileges or gaining unauthorized access to restricted functionality.
Affected Products
- Yeqifu Warehouse (all versions up to commit aaf29962ba407d22d991781de28796ee7b4670e4)
- Yeqifu Warehouse Permission Management Component
- PermissionController.java (affected functions: addPermission, updatePermission, deletePermission)
Discovery Timeline
- 2026-02-07 - CVE-2026-2078 published to NVD
- 2026-02-10 - Last updated in NVD database
Technical Details for CVE-2026-2078
Vulnerability Analysis
This vulnerability is classified as CWE-266 (Incorrect Privilege Assignment), affecting the authorization mechanisms within the Yeqifu Warehouse application. The flaw resides in the Permission Management component, specifically within the PermissionController.java file located at dataset\repos\warehouse\src\main\java\com\yeqifu\sys\controller\.
The vulnerable functions—addPermission, updatePermission, and deletePermission—fail to properly validate whether the requesting user has appropriate privileges to perform permission management operations. This improper authorization allows authenticated users with limited privileges to potentially add, modify, or delete permissions without proper access control enforcement.
Root Cause
The root cause of this vulnerability is improper authorization logic in the Permission Management controller. The affected functions do not adequately verify that the authenticated user possesses the necessary administrative privileges before executing permission modifications. This missing or inadequate authorization check allows lower-privileged users to bypass intended access controls and perform privileged operations.
Attack Vector
The vulnerability is exploitable remotely over the network by an authenticated attacker. The attack requires low privileges, meaning an attacker only needs basic authentication to the Yeqifu Warehouse application. No user interaction is required for exploitation.
An attacker can craft malicious requests to the permission management endpoints to:
- Add new permissions, potentially creating elevated access for their account
- Update existing permissions to grant themselves additional privileges
- Delete permissions to disrupt access controls for other users
The exploit details have been publicly disclosed through a GitHub Issue report, increasing the risk of active exploitation. The project maintainers were notified but have not responded as of the last update.
Detection Methods for CVE-2026-2078
Indicators of Compromise
- Unexpected modifications to permission records in the application database
- Unusual API calls to /permission/add, /permission/update, or /permission/delete endpoints from non-administrative users
- Audit logs showing permission changes by users who should not have administrative access
- New or modified permission entries that do not correlate with authorized administrative actions
Detection Strategies
- Implement application-level logging for all permission management operations, including the authenticated user's identity and privilege level
- Deploy Web Application Firewall (WAF) rules to monitor and alert on suspicious permission manipulation requests
- Configure SentinelOne Singularity to detect anomalous authorization patterns and privilege escalation attempts
- Review access logs for permission controller endpoints to identify unauthorized access attempts
Monitoring Recommendations
- Enable comprehensive audit logging for all authentication and authorization events
- Monitor database transaction logs for unexpected INSERT, UPDATE, or DELETE operations on permission tables
- Set up alerts for permission changes occurring outside of scheduled administrative windows
- Implement real-time monitoring of user privilege changes within the application
How to Mitigate CVE-2026-2078
Immediate Actions Required
- Restrict network access to the Yeqifu Warehouse application to trusted IP ranges only
- Implement additional authorization checks at the application gateway or reverse proxy level
- Review and revoke unnecessary user accounts with access to the application
- Enable enhanced logging to monitor for exploitation attempts
Patch Information
As of the last update, no official patch has been released by the vendor. The Yeqifu Warehouse project uses a rolling release model without specific version numbers. The vulnerability was reported through GitHub Issue #55, but the project maintainers have not yet responded.
Organizations using this software should monitor the Yeqifu Warehouse GitHub repository for updates and consider implementing the workarounds below until an official fix is available.
Workarounds
- Implement a reverse proxy with additional authorization middleware to enforce privilege checks before requests reach the vulnerable endpoints
- Modify the PermissionController.java file to add proper role-based access control (RBAC) checks in the addPermission, updatePermission, and deletePermission methods
- Disable the Permission Management functionality if not critical to operations until a patch is available
- Deploy network segmentation to limit access to the application to only trusted administrative networks
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


