Executive Summary
Since mid-March, threat actors have been actively exploiting a critical security flaw in Weaver E-cology, a widely used office automation platform. Tracked as CVE-2026-22679, this vulnerability allows attackers to bypass authentication and execute remote code (RCE) on the underlying server. Initial intelligence confirms adversaries are using this access to run discovery commands—such as network enumeration and user identification—to map the victim's environment before moving laterally.
For organizations running E-cology, this is not a theoretical risk. If your Weaver server is internet-facing, assume compromise and initiate immediate hunting.
Technical Analysis
- Affected Product: Weaver E-cology (OA System).
- CVE ID: CVE-2026-22679.
- Severity: Critical (CVSS score pending, but confirmed RCE capability).
- Attack Vector: The vulnerability resides in a specific interface of the E-cology platform that fails to properly sanitize user input. This allows unauthenticated attackers to inject serialized objects or malicious parameters.
- Exploitation Status: CONFIRMED ACTIVE. Exploitation in the wild (ITW) was observed starting in mid-March.
- Attack Chain:
- Initial Access: Attacker sends a crafted HTTP request to the vulnerable E-cology endpoint.
- Execution: The server deserializes the payload or executes the script, granting system-level privileges (typically
SYSTEMor the service account context). - Discovery: Attackers immediately spawn
cmd.exeorpowershell.exeto run discovery commands (e.g.,whoami,ipconfig,net user). - Persistence: Webshells are often dropped in the webroot to maintain access.
Detection & Response
The following detection rules focus on the behavioral indicators of this specific exploit: a Java-based application server spawning command shells for discovery purposes.
Sigma Rules
---
title: Weaver E-cology Java Process Spawning Shell
id: 9a1b2c3d-4e5f-6a7b-8c9d-0e1f2a3b4c5d
status: experimental
description: Detects the Weaver E-cology Java process (java.exe or resin.exe) spawning cmd.exe or powershell.exe. This is a high-fidelity indicator of RCE exploitation.
references:
- https://www.bleepingcomputer.com/news/security/weaver-e-cology-critical-bug-exploited-in-attacks-since-march/
author: Security Arsenal
date: 2026/04/06
tags:
- attack.initial_access
- attack.t1190
- attack.execution
- attack.t1059.001
logsource:
category: process_creation
product: windows
detection:
selection_parent:
ParentImage|endswith:
- '\java.exe'
- '\resin.exe'
- '\tomcat.exe'
selection_child:
Image|endswith:
- '\cmd.exe'
- '\powershell.exe'
condition: all of selection_*
falsepositives:
- Legitimate administrative debugging by developers (rare)
level: critical
---
title: Discovery Commands via Web Shell Context
id: b2c3d4e5-6f7a-8b9c-0d1e-2f3a4b5c6d7e
status: experimental
description: Detects common discovery commands (whoami, ipconfig, net user) spawned by a parent process associated with web services, indicative of post-exploitation recon.
references:
- https://attack.mitre.org/techniques/T1016/
author: Security Arsenal
date: 2026/04/06
tags:
- attack.discovery
- attack.t1016
- attack.t1033
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|contains:
- 'java'
- 'resin'
- 'tomcat'
CommandLine|contains:
- 'whoami'
- 'ipconfig'
- 'net user'
- 'net group'
condition: selection
falsepositives:
- Administrator troubleshooting
level: high
KQL (Microsoft Sentinel / Defender)
Hunt for suspicious process creation patterns linked to the E-cology application stack.
// Hunt for Java/Web server parents spawning shells
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName in~ ('java.exe', 'resin.exe', 'tomcat.exe')
| where FileName in~ ('cmd.exe', 'powershell.exe')
| project Timestamp, DeviceName, AccountName, InitiatingProcessCommandLine, CommandLine, FolderPath
| order by Timestamp desc
Velociraptor VQL
Hunt for active processes matching the discovery behavior described in the threat report.
-- Hunt for web servers (Java/Resin) spawning shells or discovery commands
SELECT Pid, Name, ParentPid, Username, CommandLine
FROM pslist()
WHERE Name =~ 'cmd.exe' OR Name =~ 'powershell.exe'
AND (
Parent.Name =~ 'java.exe' OR
Parent.Name =~ 'resin.exe' OR
Parent.Name =~ 'tomcat.exe'
)
Remediation Script (PowerShell)
Use this script to audit the default E-cology directories for recently modified webshells (suspicious .jsp, .jspx, or .asp files) and check for the vulnerable service.
# Weaver E-cology Audit Script
# Checks for suspicious recent file creations in webroot and identifies the service
Write-Host "[+] Auditing Weaver E-cology for Indicators of Compromise..." -ForegroundColor Cyan
# Define common installation paths (Adjust if installed elsewhere)
$paths = @(
"C:\weaver\ecology\",
"D:\weaver\ecology\",
"C:\Program Files (x86)\Weaver\ecology\"
)
$webExtensions = @("*.jsp", "*.jspx", "*.asp", "*.asa")
$ suspiciousProcessNames = @("cmd.exe", "powershell.exe", "whoami.exe")
foreach ($path in $paths) {
if (Test-Path $path) {
Write-Host "[+] Scanning path: $path" -ForegroundColor Yellow
# Find web files created in the last 7 days
Get-ChildItem -Path $path -Recurse -Include $webExtensions -ErrorAction SilentlyContinue |
Where-Object { $_.CreationTime -gt (Get-Date).AddDays(-7) } |
Select-Object FullName, CreationTime, LastWriteTime |
Format-Table -AutoSize
# Check for suspicious processes running under the service account context
# (Requires administrative privileges to see all processes)
} else {
Write-Host "[-] Path not found: $path" -ForegroundColor DarkGray
}
}
Write-Host "[+] Audit Complete. Review files above for unauthorized webshells." -ForegroundColor Green
Remediation
- Patch Immediately: Apply the latest security patches provided by Weaver. Verify the update addresses CVE-2026-22679. If a patch is not yet available for your specific version, contact Weaver support for an emergency hotfix.
- Network Segmentation: Ensure the E-cology server is not directly accessible from the internet. Place it behind a VPN or strict Zero Trust access policy.
- WAF Configuration: Update your Web Application Firewall (WAF) rules to block known exploit patterns targeting the E-cology interface. Block common SQLi and RCE signatures on the
/weaver/path. - Compromise Assessment: If exploitation is confirmed (via the detection rules above), assume lateral movement. Reset credentials for service accounts and conduct a full forensic review of logs since mid-March.
Related Resources
Security Arsenal Penetration Testing Services AlertMonitor Platform Book a SOC Assessment vulnerability-management Intel Hub
Is your security operations ready?
Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.