CodeNewbie Community 🌱

Sharon428931
Sharon428931

Posted on

Weaver e-cology XXE Vulnerability: Patch Now or Risk Exploitation

> About Author
Hi, I'm Sharon, a product manager at Chaitin Tech. We build SafeLine, an open-source Web Application Firewall built for real-world threats. While SafeLine focuses on HTTP-layer protection, our emergency response center monitors and responds to RCE and authentication vulnerabilities across the stack to help developers stay safe.

Weaver e-cology OA is a widely used collaboration platform in China, supporting HR, finance, administration, and mobile office functions.

Recently, Weaver released a patch addressing a critical XXE (XML External Entity) vulnerability. Chaitin’s emergency response team has confirmed the bug and warns that many public-facing systems remain unpatched.

To help defenders, Chaitin has released both X-POC (remote detection) and CloudWalker (local detection) tools, which are freely available.


Vulnerability Description

The flaw comes from incomplete input filtering in one feature of e-cology. Attackers can craft malicious XML payloads that bypass the original fix, leading to:

  • Directory listing
  • Arbitrary file read
  • Possible system admin takeover

Chaitin’s researchers confirmed that only the incremental patch 10.58.1 fixes the issue. The full patch 10.58.1 does not include the relevant code.


Detection Tools

X-POC Remote Scanner

xpoc -r 401 -t http://xpoc.org
Enter fullscreen mode Exit fullscreen mode

Get it here:

CloudWalker Local Scanner

Run the binary locally for safe scanning:

weaver_ecology_xxe_vuln_scanner_windows_amd64.exe
Enter fullscreen mode Exit fullscreen mode

Download:


Affected Versions

  • e-cology 9.x
  • Incremental patch versions below 10.58.1

Mitigation & Fix

Temporary Mitigation:

  • Restrict external access; avoid exposing the system to the internet unless necessary.

Permanent Fix:

  • Install the incremental patch 10.58.1 (the full patch 10.58.1 alone is insufficient).

Product Support

  • YunTu: Built-in fingerprint detection + PoC validation
  • DongJian: Supports PoC-based detection
  • SafeLine WAF: Detects and blocks exploitation attempts by default
  • QuanXi: Detects exploitation attempts by default
  • CloudWalker: Users on platform version ≥ 23.05.001 can upgrade to EMERVULN-23.07.012 for detection support

Timeline

  • July 11 — Chaitin obtained vulnerability intelligence
  • July 12 — Vulnerability reproduced and analyzed
  • July 12 — Official advisory published

References


⚠️ If you’re running Weaver e-cology OA, patch immediately.
Exposed systems remain at high risk of exploitation. SafeLine WAF and Chaitin’s detection tools can help defend against real-world attacks.


Try It Yourself

Don’t just take our word for it. Try SafeLine and test it against real-world payloads.

Top comments (0)