{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-2852","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-20T09:00:55.867Z","datePublished":"2026-02-20T18:32:07.621Z","dateUpdated":"2026-02-24T14:39:05.081Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-20T18:32:07.621Z"},"title":"yeqifu warehouse Sales Endpoint SalesController.java deleteSales access control","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"Improper Access Controls"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-266","lang":"en","description":"Incorrect Privilege Assignment"}]}],"affected":[{"vendor":"yeqifu","product":"warehouse","versions":[{"version":"aaf29962ba407d22d991781de28796ee7b4670e4","status":"affected"}],"modules":["Sales Endpoint"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. This issue affects the function addSales/updateSales/deleteSales of the file dataset\\repos\\warehouse\\src\\main\\java\\com\\yeqifu\\bus\\controller\\SalesController.java of the component Sales Endpoint. The manipulation leads to improper access controls. The attack is possible to be carried out remotely. The exploit is publicly available and might be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-02-20T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-20T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-20T10:06:08.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"AliceS614 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347088","name":"VDB-347088 | yeqifu warehouse Sales Endpoint SalesController.java deleteSales access control","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347088","name":"VDB-347088 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.754431","name":"Submit #754431 | warehouse latest(git commit aaf29962ba407d22d991781de28796ee7b4670e4) Improper Access Controls","tags":["third-party-advisory"]},{"url":"https://github.com/yeqifu/warehouse/issues/63","tags":["issue-tracking"]},{"url":"https://github.com/yeqifu/warehouse/issues/63#issue-3846671301","tags":["exploit","issue-tracking"]},{"url":"https://github.com/yeqifu/warehouse/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-24T14:38:43.567677Z","id":"CVE-2026-2852","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-24T14:39:05.081Z"}}]}}