Dismissed
Permalink
CVE-2026-2852
6.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV):
- Attack complexity (AC):
- Privileges required (PR):
- User interaction (UI):
- Scope (S):
- Confidentiality impact (C):
- Integrity impact (I):
- Availability impact (A):
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse removed package warehouse
- @LeSuisse dismissed
yeqifu warehouse Sales Endpoint SalesController.java deleteSales access control
A vulnerability was identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This issue affects the function addSales/updateSales/deleteSales of the file dataset\repos\warehouse\src\main\java\com\yeqifu\bus\controller\SalesController.java of the component Sales Endpoint. The manipulation leads to improper access controls. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.
References
- VDB-347088 | yeqifu warehouse Sales Endpoint SalesController.java deleteSales access control vdb-entry technical-description
- VDB-347088 | CTI Indicators (IOB, IOC, TTP, IOA) signature permissions-required
- Submit #754431 | warehouse latest(git commit aaf29962ba407d22d991781de28796ee7b4670e4) Improper Access Controls third-party-advisory
- https://github.com/yeqifu/warehouse/issues/63 issue-tracking
- https://github.com/yeqifu/warehouse/issues/63#issue-3846671301 issue-tracking exploit
- https://github.com/yeqifu/warehouse/ product
Affected products
warehouse
- ==aaf29962ba407d22d991781de28796ee7b4670e4