{"vulnerability": "CVE-2026-22679", "sightings": [{"uuid": "a039431c-1a42-47e2-a677-f35b823436a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3miw4lq6m3a2g", "content": "", "creation_timestamp": "2026-04-07T15:43:02.043148Z"}, {"uuid": "76f7f838-7d04-4840-b888-b3121554ee40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "published-proof-of-concept", "source": "Telegram/QBh1F_HyWJUCKYAyST3Bw6jIrLbUd_JEHanO8DcWQ_ylla0", "content": "", "creation_timestamp": "2026-04-07T15:21:06.000000Z"}, {"uuid": "7454efa4-3025-42e3-81bc-986653061f12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/80557", "content": "\ud83d\udea8 GitHub \u76d1\u63a7\u6d88\u606f\u63d0\u9192\n\n\ud83d\udea8 \u53d1\u73b0\u5173\u952e\u8bcd\uff1a #CVE-2026\n\n\ud83d\udce6 \u9879\u76ee\u540d\u79f0\uff1a CVE-2026-22679\n\ud83d\udc64 \u9879\u76ee\u4f5c\u8005\uff1a keraattin\n\ud83d\udee0 \u5f00\u53d1\u8bed\u8a00\uff1a Python\n\u2b50 Star\u6570\u91cf\uff1a 0  |  \ud83c\udf74 Fork\u6570\u91cf\uff1a 0\n\ud83d\udcc5 \u66f4\u65b0\u65f6\u95f4\uff1a 2026-04-16 13:56:59\n\n\ud83d\udcdd \u9879\u76ee\u63cf\u8ff0\uff1a\nCritical RCE vulnerability (CVSS 9.3) in Weaver E-cology platform versions prior to build 20260312. Unauthenticated remote code execution via exposed debug endpoint at /papi/esearch/data/devops/dubboApi/debug/method. Comprehensive analysis, proof-of-concept, and detection guidance included.\n\n\ud83d\udd17 \u70b9\u51fb\u8bbf\u95ee\u9879\u76ee\u5730\u5740", "creation_timestamp": "2026-04-16T14:00:05.000000Z"}, {"uuid": "4c16434d-523f-4405-ba46-330688d902bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "published-proof-of-concept", "source": "Telegram/YdSs7ODl4GqLLTJMVDK5lc2sRwnfVBIE8xXSYrBaURrpR0I", "content": "", "creation_timestamp": "2026-04-16T21:00:04.000000Z"}, {"uuid": "046aac78-5b36-46cb-bd04-98eebed1d8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "published-proof-of-concept", "source": "Telegram/13SJvff8QI2qaATds71XzXY76pj2q7KNSKHIOkghUW-N2nM", "content": "", "creation_timestamp": "2026-04-16T15:00:13.000000Z"}, {"uuid": "719cd900-6159-43cd-b189-7e28aa8bea13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3miz6wtlyzn2l", "content": "", "creation_timestamp": "2026-04-08T21:03:01.886706Z"}, {"uuid": "50eb758e-64dc-4349-95a3-154812ab389a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://t.me/BleepingComputer/24602", "content": "\u200aWeaver E-cology critical bug exploited in attacks since March\n\nHackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands. [...]\n\nhttps://www.bleepingcomputer.com/news/security/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/", "creation_timestamp": "2026-05-04T22:14:37.000000Z"}, {"uuid": "e8ae8002-6384-40de-aa64-22910eb66028", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3ml2oyd3p4u2f", "content": "Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands.", "creation_timestamp": "2026-05-04T22:13:13.995897Z"}, {"uuid": "f2faf5c4-9f6b-4745-a854-3f606bb6f342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ml2xlqkigdo2", "content": "Weaver E-cology critical bug exploited in attacks since March BleepingComputer Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since ...\n\n#Security #News\n\nOrigin | Interest | Match", "creation_timestamp": "2026-05-05T00:47:32.628598Z"}, {"uuid": "f0c5f1b2-0507-4fad-9b65-1d98df5ce730", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/hendryadrian.bsky.social/post/3ml32tnnq4k2s", "content": "A critical unauthenticated RCE (CVE-2026-22679) exploited since March in Weaver E-cology 10.0 via an exposed debug API allowed remote command execution. Patch released March 12 removes the vulnerable endpoint. #WeaverEcology #RemoteCodeExec #China", "creation_timestamp": "2026-05-05T01:45:23.353840Z"}, {"uuid": "5cd01f6d-f53a-4934-a38d-f4eee996b13c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/crustytldr.bsky.social/post/3ml33t3cxic2v", "content": "\ud83d\udd12 Weaver E-cology critical bug exploited in attacks since March\n\nHackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-Ma...\n\nhttps://is.gd/m3Ibyb #CyberSecurity #InfoSec #CrustyTLDR", "creation_timestamp": "2026-05-05T02:02:56.470081Z"}, {"uuid": "f8241786-bc89-4e3e-888d-07c6ae9db8e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3ml35daxrws2s", "content": "Top 3 CVE for last 7 days:\nCVE-2026-31431: 540 interactions\nCVE-2026-41940: 82 interactions\nCVE-2026-3854: 57 interactions\n\n\nTop 3 CVE for yesterday:\nCVE-2026-31431: 59 interactions\nCVE-2026-41940: 8 interactions\nCVE-2026-22679: 5 interactions\n", "creation_timestamp": "2026-05-05T02:29:53.558497Z"}, {"uuid": "bfde45e6-5ba1-41d8-a3fb-c60024b1dd62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-22679", "type": "seen", "source": "https://bsky.app/profile/Dunuq-Vumuc.technodon.org.ap.brid.gy/post/3ml3ikt6roxr2", "content": "https://www.bleepingcomputer.com/news/security/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/\nWeaver E-cologyn RCE-haavoittuvuutta hy\u00f6dynnettiin p\u00e4ivi\u00e4 p\u00e4ivityksen j\u00e4lkeen Kriittist\u00e4 todentamatonta RCE-haavoittuvuutta CVE-2026-22679", "creation_timestamp": "2026-05-05T05:51:03.207609Z"}]}