Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Posted on May 5, 2026 By CWS

Recent cybersecurity reports have highlighted the exploitation of two severe vulnerabilities affecting MetInfo and Weaver E-cology. These vulnerabilities enable attackers to remotely execute arbitrary code without needing authentication, posing significant risks to affected systems.

MetInfo CMS Vulnerability

MetInfo, a popular enterprise content management system (CMS) utilizing PHP and MySQL, has been found vulnerable to a critical security flaw identified as CVE-2026-29014. This flaw, with a CVSS score of 9.8, was disclosed in early April. It allows attackers to inject PHP code due to inadequate input neutralization, facilitating remote code execution and server takeover.

According to VulnCheck, the exploitation of this vulnerability began last week, with a notable increase in activity over the weekend, primarily targeting servers located in Singapore. Approximately 2,000 MetInfo instances are accessible online, mostly within China.

Weaver E-cology Exploitation

Weaver E-cology, a widely utilized office automation and collaboration tool in China, has also been targeted. The vulnerability, tracked as CVE-2026-22679, holds a CVSS score of 9.3. It involves exposed debug functionality that can be exploited via specially crafted POST requests, allowing for arbitrary command execution.

Patches for this vulnerability were issued on March 12, but exploitation attempts were detected shortly thereafter. Attackers utilized ping callbacks to probe the vulnerability and delivered payloads through the debug endpoint, operating it as a shell for command execution.

Response and Mitigation

The recent surge in exploitation attempts underscores the necessity for immediate action. Organizations using MetInfo and Weaver E-cology should apply security patches without delay to mitigate these vulnerabilities. Continuous monitoring and adopting robust cybersecurity practices are essential to safeguard against such threats.

As cyber threats evolve, staying informed and proactive is crucial. Regular updates and vigilance can help prevent exploitation and protect sensitive data from malicious actors.

Security Week News Tags:CVE-2026-22679, CVE-2026-29014, Cybersecurity, MetInfo, office automation, PHP code injection, remote code execution, security patches, Vulnerabilities, Weaver E-cology

Post navigation

Previous Post: ScarCruft Targets Game Platform with BirdCall Malware
Next Post: New Framework Enhances APT Attribution

Related Posts

Chilean Cybercrime Suspect Extradited to the US Chilean Cybercrime Suspect Extradited to the US Security Week News
Microsoft Resolves SharePoint Zero-Day and 160 More Flaws Microsoft Resolves SharePoint Zero-Day and 160 More Flaws Security Week News
Call for Presentations Open for 2025 CISO Forum Virtual Summit Call for Presentations Open for 2025 CISO Forum Virtual Summit Security Week News
WhatsApp View Once Bypass Found, Meta Won’t Fix WhatsApp View Once Bypass Found, Meta Won’t Fix Security Week News
Tim Kosiba Named NSA Deputy Director Tim Kosiba Named NSA Deputy Director Security Week News
CISA Confirms Exploitation of Latest Oracle EBS Vulnerability  CISA Confirms Exploitation of Latest Oracle EBS Vulnerability  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WhatsApp Flaw Exploited via Instagram Reels Integration
  • Apache Patches Critical Vulnerabilities in HTTP Server
  • AI Service Security Risks: A Deep Dive into Exposed Systems
  • New Framework Enhances APT Attribution
  • Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WhatsApp Flaw Exploited via Instagram Reels Integration
  • Apache Patches Critical Vulnerabilities in HTTP Server
  • AI Service Security Risks: A Deep Dive into Exposed Systems
  • New Framework Enhances APT Attribution
  • Critical Vulnerabilities in MetInfo and Weaver E-cology Exploited

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark