CVE-2026-0571
Unknown Unknown - Not Provided
Path Traversal in yeqifu Warehouse createResponseEntity Function

Publication date: 2026-01-02

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in yeqifu warehouse up to aaf29962ba407d22d991781de28796ee7b4670e4. Affected by this issue is the function createResponseEntity of the file warehouse\src\main\java\com\yeqifu\sys\common\AppFileUtils.java. The manipulation of the argument path results in path traversal. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-02
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-01-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
yeqifu warehouse to aaf29962ba407d22d991781de28796ee7b4670e4 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a path traversal flaw in the yeqifu warehouse application, specifically in the createResponseEntity function of the AppFileUtils.java file. It occurs because the application improperly handles the input argument 'path', allowing an attacker to manipulate this parameter to traverse directories outside the intended restricted directory. This enables unauthorized access to arbitrary files on the server. The vulnerability is remotely exploitable and has a public proof-of-concept exploit available. [1, 3]


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker to remotely access and read arbitrary files on your server that should be protected. This compromises the confidentiality of sensitive information stored on the server, potentially exposing private data or configuration files. Since the exploit is publicly available, the risk of attack is increased. [1, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the image display endpoint /file/showImageByPath with manipulated path parameters that include relative path sequences (e.g., ../) to attempt path traversal. For example, you can use curl commands to send requests with crafted path parameters to check if unauthorized files can be accessed. A sample command might be: curl 'http://<target>/file/showImageByPath?path=../../../../etc/passwd' to test if the server returns the contents of sensitive files. Monitoring network traffic for such suspicious requests or scanning logs for unusual path traversal attempts can also help detect exploitation attempts. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or disabling the vulnerable endpoint if possible, implementing strict input validation and sanitization on the path parameter to prevent path traversal sequences, and monitoring for exploitation attempts. Since no known countermeasures or patches are currently identified and the product follows a rolling release model, consider replacing the yeqifu warehouse product with an alternative solution to avoid exposure. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthorized access to arbitrary files on the server, compromising confidentiality. Such unauthorized data exposure can lead to violations of data protection regulations like GDPR and HIPAA, which require safeguarding personal and sensitive information. Therefore, exploitation of this flaw may result in non-compliance with these standards due to potential data breaches. [1, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart