CVE-2022-50993
CRITICAL EXPLOITEDWeaver E-office < 10.0_20221201 Unauthenticated Arbitrary File Read via XmlRpcServlet
Title source: cnaDescription
Weaver (Fanwei) E-office versions prior to 10.0_20221201 contain an unauthenticated arbitrary file upload vulnerability in the OfficeServer.php endpoint that allows remote attackers to upload malicious files by sending multipart POST requests with arbitrary filenames and disguised content types. Attackers can upload PHP webshells to the Document directory and execute them via HTTP GET requests to achieve remote code execution as the web server user. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-10-10 (UTC).
References (4)
Core 4
Core References
Patch release-notes
patch
https://service.e-office.cn/knowledge/detail/5
Exploit technical-description
exploit
https://cn-sec.com/archives/1453025.html
Exploit technical-description
exploit
https://bbs.chaitin.cn/topic/37
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/weaver-e-office-10-0-20221201-unauthenticated-arbitrary-file-read-via-xmlrpcservlet
Scores
CVSS v3
9.8
EPSS
0.0022
EPSS Percentile
43.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
VulnCheck KEV
2026-04-30
CWE
CWE-434
Status
published
Products (1)
Weaver Network Co., Ltd./E-office
< 10.0_20221201
Published
Apr 30, 2026
Tracked Since
Apr 30, 2026