{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreichkxyby5grmsoj6dlopoaunuoxdd7bllmzjvu7w3a4v34wwcddvu",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3ml4bpsy7vgk2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreiefkbqayfodxgnjohtjqbqnkw5qfhuiw33n6r6xt7fwnzgkshk65y"
    },
    "mimeType": "image/jpeg",
    "size": 164026
  },
  "path": "/2026/05/weaver-e-cology-rce-flaw-cve-2026-22679.html",
  "publishedAt": "2026-05-05T07:37:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "A critical security vulnerability in Weaver (Fanwei) E-cology, an enterprise office automation (OA) and collaboration platform, has come under active exploitation in the wild.\nThe vulnerability (CVE-2026-22679, CVSS score: 9.8) relates to a case of unauthenticated remote code execution affecting Weaver E-cology 10.0 versions prior to 20260312. The issue resides in the \"/papi/esearch/data/devops/",
  "title": "Weaver E-cology RCE Flaw CVE-2026-22679 Actively Exploited via Debug API"
}