| Description: | | The MessageType.do endpoint in Weaver E-cology OA fails to sanitize the uploadID parameter, allowing unauthenticated attackers to inject arbitrary SQL through escaped or encoded quote sequences. By subverting the backend query logic, adversaries can exfiltrate the entire corporate dataset—employee directories, workflow forms, payroll records, and contract attachments—alter approval states, or plant persistent web shells via database write access. Typically deployed inside trusted networks with high-privilege database roles, successful exploitation enables lateral movement to financial and HR systems, leading to mass data leakage, business-process paralysis, and regulatory non-compliance. |