Property
Languagepython
Severityhigh
CWECWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (‘Eval Injection’)
OWASPA03:2021 - Injection
Confidence LevelMedium
Impact LevelHigh
Likelihood LevelHigh

Description#

User input from web requests is being passed directly to run_in_subinterp, which executes Python code in a new interpreter. This allows attackers to inject and run arbitrary Python code on the server.

Impact#

If exploited, an attacker could execute any Python commands on the server, potentially leading to data theft, data loss, service disruption, or full system compromise. This puts both the application and underlying server at severe risk.