CVE-2022-50993

Weaver · E-office

Weaver E-office is vulnerable to unauthenticated arbitrary file upload via OfficeServer.php, allowing remote attackers to execute code via webshells.

Executive summary

A critical, actively exploited vulnerability in Weaver E-office allows unauthenticated attackers to execute arbitrary code on the host server.

Vulnerability

The OfficeServer.php endpoint allows unauthenticated users to upload arbitrary files. By uploading a PHP file, an attacker can achieve remote code execution as the web server user.

Business impact

With a CVSS score of 9.8, this vulnerability is extremely dangerous. Active exploitation has been observed in the wild since 2022. Successful exploitation gives an attacker full control over the application server, allowing for data theft and further network penetration.

Remediation

Immediate Action: Update Weaver E-office to version 10.0_20221201 or later immediately.

Proactive Monitoring: Scan servers for unauthorized PHP files in the Document directory and review web server logs for requests to suspicious file paths.

Compensating Controls: Restrict access to OfficeServer.php via firewall rules or WAF policies if immediate patching is not possible.

Exploitation status

Public Exploit Available: Yes

Analyst recommendation

This is a critical, high-risk vulnerability with confirmed active exploitation. If your organization is running an affected version, assume compromise and initiate incident response procedures immediately alongside patching.