Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Posted on May 5, 2026 By CWS

Recent cybersecurity reports have highlighted the exploitation of two severe vulnerabilities affecting MetInfo and Weaver E-cology. These vulnerabilities enable attackers to remotely execute arbitrary code without needing authentication, posing significant risks to affected systems.

MetInfo CMS Vulnerability

MetInfo, a popular enterprise content management system (CMS) utilizing PHP and MySQL, has been found vulnerable to a critical security flaw identified as CVE-2026-29014. This flaw, with a CVSS score of 9.8, was disclosed in early April. It allows attackers to inject PHP code due to inadequate input neutralization, facilitating remote code execution and server takeover.

According to VulnCheck, the exploitation of this vulnerability began last week, with a notable increase in activity over the weekend, primarily targeting servers located in Singapore. Approximately 2,000 MetInfo instances are accessible online, mostly within China.

Weaver E-cology Exploitation

Weaver E-cology, a widely utilized office automation and collaboration tool in China, has also been targeted. The vulnerability, tracked as CVE-2026-22679, holds a CVSS score of 9.3. It involves exposed debug functionality that can be exploited via specially crafted POST requests, allowing for arbitrary command execution.

Patches for this vulnerability were issued on March 12, but exploitation attempts were detected shortly thereafter. Attackers utilized ping callbacks to probe the vulnerability and delivered payloads through the debug endpoint, operating it as a shell for command execution.

Response and Mitigation

The recent surge in exploitation attempts underscores the necessity for immediate action. Organizations using MetInfo and Weaver E-cology should apply security patches without delay to mitigate these vulnerabilities. Continuous monitoring and adopting robust cybersecurity practices are essential to safeguard against such threats.

As cyber threats evolve, staying informed and proactive is crucial. Regular updates and vigilance can help prevent exploitation and protect sensitive data from malicious actors.

Security Week News Tags:CVE-2026-22679, CVE-2026-29014, Cybersecurity, MetInfo, office automation, PHP code injection, remote code execution, security patches, Vulnerabilities, Weaver E-cology

Post navigation

Previous Post: ScarCruft Targets Game Platform with BirdCall Malware
Next Post: New Framework Enhances APT Attribution

Related Posts

DraftKings Hacker Receives Prison Sentence for Cyber Attack DraftKings Hacker Receives Prison Sentence for Cyber Attack Security Week News
Critical Vulnerabilities Patched in TP-Link’s Omada Gateways Critical Vulnerabilities Patched in TP-Link’s Omada Gateways Security Week News
Vulnerabilities Exposed Phone Number of Any Google User Vulnerabilities Exposed Phone Number of Any Google User Security Week News
6G Network Security Principles Unveiled by Global Coalition 6G Network Security Principles Unveiled by Global Coalition Security Week News
Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage Security Week News
Critical VMware Aria Operations Flaw Actively Targeted Critical VMware Aria Operations Flaw Actively Targeted Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability Threatens 300,000 Ollama Deployments
  • OAuth Risks: The Overlooked Threat to Corporate Security
  • Phishing Emails Exploit Code of Conduct in AiTM Attack
  • Android Update Fixes Critical Remote Code Threat
  • WhatsApp Flaw Exploited via Instagram Reels Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability Threatens 300,000 Ollama Deployments
  • OAuth Risks: The Overlooked Threat to Corporate Security
  • Phishing Emails Exploit Code of Conduct in AiTM Attack
  • Android Update Fixes Critical Remote Code Threat
  • WhatsApp Flaw Exploited via Instagram Reels Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark