A critical vulnerability in Weaver E-cology, an enterprise office automation platform, is being actively exploited, allowing unauthenticated remote code execution. The flaw, tracked as CVE-2026-22679, affects versions prior to 20260312 and has a CVSS score of 9.8, indicating a highly severe issue. The vulnerability is located in the debug API, specifically in the "/papi/esearch/data/devops/" endpoint, enabling attackers to execute arbitrary code without authentication. This exploit can lead to significant security breaches, including data theft and system compromise. The active exploitation of this vulnerability expands the attack surface, making it essential for organizations using Weaver E-cology to prioritize patches and mitigations based on their exposure and evidence of exploitation1. This vulnerability poses a significant risk to organizations, and addressing it promptly is crucial to prevent potential security disasters.