CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

[High-Risk] E-cology SQL Injection Vulnerability Allows Full Server Takeover

About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Weaver E-cology is a business collaboration and office automation platform widely used in HR, finance, administration, and mobile workflows.

In June 2025, a major SQL injection vulnerability was patched by Weaver. If exploited, this flaw can allow attackers to bypass authentication and even gain full control of the target server. Organizations running affected versions should patch immediately.


Vulnerability Overview

Cause

The E-cology backend was found to directly concatenate user-controlled input into SQL statements without proper sanitization. This leads to a classic SQL injection vulnerability.

If an attacker supplies a malicious payload, it may allow:

  • Arbitrary SQL command execution
  • Information disclosure
  • (On SQL Server) Remote Code Execution (RCE) via Ole Automation Procedures, potentially writing a web shell to the server

Severity

Field Info
CVE Status Not assigned yet
Vulnerability Type SQL Injection
Impact High – potential RCE
Attack Vector Remote (No Auth Required)
User Interaction None
Affected Config Default
Public Exploit No POC/EXP released
Fix Complexity Low – patch available

Affected Versions

  • E-cology 9.x
  • Specifically, versions prior to v10.75

Mitigation & Patch

Temporary Workaround

  • Restrict external network access (e.g., through firewalls)
  • Do not expose the system directly to the internet unless absolutely necessary

Official Patch

Weaver has released a patch package that supports both online upgrade and offline installation. Download here:

πŸ”— https://www.weaver.com.cn/cs/securityDownload.html?src=cn


Reproduction Status

The vulnerability has been successfully reproduced in the lab. Exploitation is possible under default configurations.

Image description


Product Detection Support

Product Support Status
YunTu Fingerprint + POC detection
DongJian Custom POC support ETA: 2025.6.17
SafeLine Built-in detection supported
QuanXi Built-in detection supported

Timeline

  • June 17, 2025 β€” Vulnerability publicly disclosed by Chaitin Security Response Center

Stay alert and patch early β€” this one’s serious.


Join the SafeLine Community

Top comments (0)