Security for everyone

CVE-2023-2766 Scanner

Detects 'Directory Traversal' vulnerability in Weaver OA affects v. 9.5.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2023-2766 Scanner Detail

Weaver OA 9.5 is a popular application that is used by many businesses and organizations for managing and monitoring their buildings and facilities. It is a powerful tool that simplifies the complex process of building management by bringing everything under one digital umbrella. Using Weaver OA, building managers can easily check different parameters such as energy usage, water consumption, temperature, and humidity, among others. The application allows them to automate tasks, receive alerts, and schedule maintenance checks to ensure everything is running smoothly. 

Recently, a dangerous vulnerability has been detected in Weaver OA version 9.5, which has been classified as problematic. The vulnerability code is CVE-2023-2766, and it affects some of the processing that occurs in the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. This file contains sensitive information such as passwords and configurations, and the manipulation of it by attackers can lead to the exposure of files or directories that are supposed to be inaccessible. 

If exploited, this vulnerability can have severe consequences for businesses and organizations using Weaver OA. Attackers can gain access to private and sensitive data, which can be used for blackmail, espionage, or other malicious purposes. In addition, attackers can use this vulnerability to execute arbitrary code on the affected system, which can lead to the complete compromise of the system, or even the entire network. 

In conclusion, the CVE-2023-2766 vulnerability in Weaver OA version 9.5 is a significant threat that organizations need to be aware of and take precautions against. By updating the application, applying access controls, monitoring for suspicious activity, and using strong authentication measures, businesses can mitigate the risk of a cyberattack. Subscribing to the pro features of can help streamline this process and enhance security even further.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture