radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API

sourceThe Hacker News
calendar_todayMay 5, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical RCE Vulnerability in Weaver E-cology Actively Exploited

Summary

A critical remote code execution (RCE) vulnerability in Weaver E-cology, identified as CVE-2026-22679, is being actively exploited. This flaw affects versions of the Weaver E-cology platform prior to 20260312, posing significant security risks.

Key Points

  • Vulnerability: CVE-2026-22679
  • Severity: Critical, with a CVSS score of 9.8
  • Affected Product: Weaver E-cology 10.0 versions prior to 20260312
  • Exploitation: Active exploitation in the wild
  • Issue: Unauthenticated remote code execution via the "/papi/esearch/data/devops/" API

Analysis

The active exploitation of CVE-2026-22679 highlights the critical nature of this vulnerability, which allows unauthenticated attackers to execute arbitrary code remotely. The high CVSS score of 9.8 underscores the potential impact on organizations using vulnerable versions of Weaver E-cology. Immediate attention is required to mitigate this threat and protect sensitive enterprise data.

Conclusion

IT professionals should urgently apply patches or updates to Weaver E-cology to versions beyond 20260312 to mitigate the risk of exploitation. Continuous monitoring and reviewing of security protocols are recommended to safeguard against similar vulnerabilities.