{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreichkxyby5grmsoj6dlopoaunuoxdd7bllmzjvu7w3a4v34wwcddvu",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3ml4bpsy7vgk2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiefkbqayfodxgnjohtjqbqnkw5qfhuiw33n6r6xt7fwnzgkshk65y"
},
"mimeType": "image/jpeg",
"size": 164026
},
"path": "/2026/05/weaver-e-cology-rce-flaw-cve-2026-22679.html",
"publishedAt": "2026-05-05T07:37:00.000Z",
"site": "https://thehackernews.com",
"textContent": "A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild.\nThe vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the \"/papi/esearch/data/devops/",
"title": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API"
}