Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weaver
Weaver e-office |
|
| Vendors & Products |
Weaver
Weaver e-office |
Thu, 30 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Weaver (Fanwei) E-office versions prior to 10.0_20221201 contain an unauthenticated arbitrary file upload vulnerability in the OfficeServer.php endpoint that allows remote attackers to upload malicious files by sending multipart POST requests with arbitrary filenames and disguised content types. Attackers can upload PHP webshells to the Document directory and execute them via HTTP GET requests to achieve remote code execution as the web server user. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-10-10 (UTC). | |
| Title | Weaver E-office < 10.0_20221201 Unauthenticated Arbitrary File Read via XmlRpcServlet | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:07:00.943Z
Reserved: 2026-04-29T18:22:05.872Z
Link: CVE-2022-50993
Updated: 2026-04-30T18:24:07.804Z
Status : Deferred
Published: 2026-04-30T17:16:24.800
Modified: 2026-04-30T17:19:57.853
Link: CVE-2022-50993
No data.
OpenCVE Enrichment
Updated: 2026-05-01T08:21:16Z