Description

A critical vulnerability CVE 2026 22679 in Weaver E ecology has been actively exploited by attackers since mid March 2026. The issue affects E ecology 10.0 versions prior to March 12 and allows unauthenticated remote code execution through an exposed debug API endpoint. Attackers began exploiting the flaw just five days after a security update was released and even before it was publicly disclosed. During the attacks they executed reconnaissance commands like whoami ipconfig and tasklist and attempted to download payloads using PowerShell though many actions were blocked by endpoint security. The main reason for this vulnerability is improper input validation and lack of authentication in the debug API endpoint. This allows user supplied data to directly interact with backend RPC functions effectively turning the endpoint into a command execution interface. Attackers first tested remote execution using ping callbacks and then attempted to deploy MSI based payloads and fileless PowerShell scripts showing an intent to gain deeper access and control of systems. Although the attackers were able to exploit the RCE flaw they did not successfully establish persistence on the targeted systems. This highlights the importance of timely patching and securing exposed internal components. Since no alternative workaround is available organizations using Weaver E ecology should immediately update to the latest patched version to remove the vulnerable endpoint and reduce the risk of further attacks.