A critical vulnerability in Weaver E-cology, an enterprise office automation platform, is being actively exploited, allowing unauthenticated remote code execution. The flaw, tracked as CVE-2026-22679, affects versions prior to 20260312 and has a CVSS score of 9.8, indicating a highly severe issue. The vulnerability is located in the debug API, specifically in the "/papi/esearch/data/devops/" endpoint, enabling attackers to execute arbitrary code without authentication. This exploit can lead to significant security breaches, including data theft and system compromise. The active exploitation of this vulnerability expands the attack surface, making it essential for organizations using Weaver E-cology to prioritize patches and mitigations based on their exposure and evidence of exploitation1. This vulnerability poses a significant risk to organizations, and addressing it promptly is crucial to prevent potential security disasters.
Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API
⚠️ Critical Alert
Why This Matters
CVE-2026-22679 disclosure expands the active attack surface — prioritize based on your exposure and exploitation evidence.
References
- The Hacker News. (2026, May 5). Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API. *The Hacker News*. https://thehackernews.com/2026/05/weaver-e-cology-rce-flaw-cve-2026-22679.html
Original Source
The Hacker News
Read original →