[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2022-50993":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-01T12:24:33.086Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":68,"aliases":83,"duplicate_of":9,"upstream":84,"downstream":85,"duplicates":86,"related":87,"reserved_at":9,"published_at":88,"modified_at":89,"state":90,"summary":91,"references_raw":97,"kevs":118,"epss":9,"epss_history":119,"metrics":120,"affected":132},"CVE-2022-50993","Weaver (Fanwei) E-office versions prior to 10.0_20221201 contain an unauthenticated arbitrary file upload vulnerability in the OfficeServer.php endpoint that allows remote attackers to upload malicious files by sending multipart POST requests with arbitrary filenames and disguised content types. Attackers can upload PHP webshells to the Document directory and execute them via HTTP GET requests to achieve remote code execution as the web server user. Exploitation evidence was first observed by the Shadowserver Foundation on 2022-10-10 (UTC).",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-434","Unrestricted Upload of File with Dangerous Type","The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.","weakness","Draft","Base","Medium",[20],{"id":21,"name":22,"techniques":23},"CAPEC-1","Accessing Functionality Not Properly Constrained by ACLs",[24],{"id":25,"name":26,"tactics":27,"countermeasures":43},"T1574.010","Services File Permissions Weakness",[28,31,34,37,40],{"id":29,"name":30},"TA0110","Persistence",{"id":32,"name":33},"TA0111","Privilege Escalation",{"id":35,"name":36},"TA0030","Defense Evasion",{"id":38,"name":39},"TA0005","Stealth",{"id":41,"name":42},"TA0104","Execution",[44,49,53,58,63],{"id":45,"name":46,"tactic":47},"D3-SWI","Software Inventory",{"name":48},"Model",{"id":50,"name":51,"tactic":52},"D3-AVE","Asset Vulnerability Enumeration",{"name":48},{"id":54,"name":55,"tactic":56},"D3-SBV","Service Binary Verification",{"name":57},"Detect",{"id":59,"name":60,"tactic":61},"D3-SU","Software Update",{"name":62},"Harden",{"id":64,"name":65,"tactic":66},"D3-RS","Restore Software",{"name":67},"Restore",[69,78],{"_key":70,"name":71,"source":72,"url":73,"maturity":74,"reliability_score":75,"verified":76,"type":9,"platforms":77,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_140D1A68C8463469","Exploit Reference (cn-sec.com)","reference","https://cn-sec.com/archives/1453025.html","unknown",0.2,false,[],{"_key":79,"name":80,"source":72,"url":81,"maturity":74,"reliability_score":75,"verified":76,"type":9,"platforms":82,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_E28B9027AD6D6FB9","Exploit Reference (bbs.chaitin.cn)","https://bbs.chaitin.cn/topic/37",[],[],[],[],[],[],"2026-04-30T16:08:46.184Z","2026-04-30T18:24:11.947Z","Deferred",{"cisa_kev":76,"cisa_ransomware":76,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":92,"severity_score":93,"severity_version":94,"severity_source":95,"severity_vector":96,"severity_status":90},"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[98,105,110,113],{"url":99,"sources":100,"tags":102},"https://service.e-office.cn/knowledge/detail/5",[95,101],"nvd",[103,104],"Release Notes","Patch",{"url":73,"sources":106,"tags":107},[95,101],[108,109],"Technical Description","Exploit",{"url":81,"sources":111,"tags":112},[95,101],[108,109],{"url":114,"sources":115,"tags":116},"https://www.vulncheck.com/advisories/weaver-e-office-10-0-20221201-unauthenticated-arbitrary-file-read-via-xmlrpcservlet",[95,101],[117],"Third Party Advisory",[],[],[121,128],{"source":95,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":122,"cvss_v4_0":125},{"baseScore":93,"baseSeverity":123,"vectorString":96,"impactScore":93,"exploitabilityScore":124},"CRITICAL",10,{"baseScore":126,"baseSeverity":123,"vectorString":127,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",{"source":101,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":129,"cvss_v4_0":130},{"baseScore":93,"baseSeverity":123,"vectorString":96,"impactScore":93,"exploitabilityScore":124},{"baseScore":126,"baseSeverity":123,"vectorString":131,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[133],{"ecosystem":9,"name":134,"vendor":135,"product":136,"cpe_part":137,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":138},"E-office","weaver network co., ltd.","e-office","a",[139],{"version":140,"is_range":141,"range_type":95,"version_start":9,"version_start_type":9,"version_end":142,"version_end_type":143,"fixed_in":9},"\u003C 10.0_20221201",true,"10.0_20221201","excluding"]