Severity

7.3

Vulnerability Type

Improper Input Validation (CWE-20) external link

Summary

An unauthenticated remote attacker can perform a command injection with limited privileges due to improper input validation.