Property
Languagephp
Severitymedium
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelLow
Impact LevelHigh
Likelihood LevelLow

Description#

Using eval() with dynamic, non-constant input allows execution of arbitrary PHP code. This makes it possible for attackers to inject and run malicious code if they control the input.

Impact#

If exploited, an attacker could execute any PHP code on your server, potentially leading to data theft, server compromise, or complete takeover of the application. This poses a serious risk to both application integrity and user data.