[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f0YNxhuLj1g5Q62fHdnIo66gDe7HvGsoHQQRFPQas0fk":3},{"article":4,"iocs":37},{"id":5,"title":6,"slug":7,"summary":6,"ai_summary":8,"brief":9,"full_text":10,"url":11,"image_url":10,"published_at":12,"ingested_at":13,"relevance_score":14,"entities":15,"category_id":22,"category":23,"article_tags":26},"3d15d9ed-1962-443b-a048-896862bcf4ef","Weaver E-cology RCE Flaw Actively Exploited via Exposed Debug API\n\nhttps:\u002F\u002Ft.co\u002FToYEmKIS6s","weaver-e-cology-rce-flaw-actively-exploited-via-exposed-debug-api-https-t-co-toy-46ffdb","A critical remote code execution vulnerability in Weaver E-cology, a widely-deployed enterprise content management and workflow system, is being actively exploited in the wild via an exposed debug API endpoint. The flaw allows unauthenticated attackers to execute arbitrary code on affected systems. This represents a significant supply-chain risk given E-cology's use across government, finance, and enterprise organizations globally.","Weaver E-cology remote code execution flaw actively exploited through exposed debug API.",null,"https:\u002F\u002Fx.com\u002FDarkWebInformer\u002Fstatus\u002F2051703330938741074","2026-05-05T16:39:27+00:00","2026-05-05T17:00:08.873292+00:00",9,[16,19],{"name":17,"type":18},"Weaver E-cology","product",{"name":20,"type":21},"Weaver","vendor","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":22,"icon":10,"name":24,"slug":25},"Vulnerabilities","vulnerabilities",[27,32],{"category":28},{"id":29,"icon":10,"name":30,"slug":31},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":33},{"id":34,"icon":10,"name":35,"slug":36},"574f766a-fb3f-487c-8d2c-0720ae75471b","Zero-day","zero-day",[]]