#374 HIGH: Shell command injection via unescaped variables

closed high Created 2025-12-11 21:54 · Updated 2025-12-11 22:05

Description

Edit
shell_command.py:278-281 resolves variables and passes directly to shell=True subprocess. If {{user_input}} contains '; rm -rf /', it executes. Fix: Use shlex.quote() when interpolating variables into shell commands.

Comments

Loading comments...

Context

Loading context...

Audit History

View All
Loading audit history...