Weaver E-cology critical bug exploited in attacks since March
Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands.
Grace Ops
grace intelligence for incident response
freshgrace connected • no recommendations yetweekly health 44trend on track
1
IOC Workbench
typed indicators with fast copy and export actions
1 total
1 indicators staged for handoff.
2
AEO/GEO Strategy Agent
what to publish this week to improve AI search rank across the full feed
2 formats
!Weekly plan: focus + actions + proof signals for ranking gains.
this week's focus2 topics
1. zero-day
2. critical
focus confidence
top 3 actions + whyidle
- Topic coverage this cycle: 2 prioritized themes.
- Answer inclusion signal: 33% with AEO score 33.33.
- Execution backlog: 0 open recommendations.
aeo score
3
Response Tracks
fast operational tracks from this incident snapshot
4 tracks
source-backed 1 refs
audit trail / provenance3
Provenance
Claims tie surfaced fields back to sources, models, or heuristics.
- severity.upliftheuristicn/aCVE or advisory identifiers detected — floor raised to at least high.
- severity.upliftheuristicn/aActive exploitation / in-the-wild language detected — floor raised to at least high.
- severity.upliftheuristicn/aCombined zero-day/exploit + ransomware/mass-impact signals → critical.
What changed
Append-only revisions when ingest or analysts evolve the record.
No revision rows stored yet.
Sources
Curated May 04, 2026 by the ahackaday team./Sources verified./Brief grounded in 1 source.
discussion
Sign in to join the thread and vote on comments.
Loading comments…