Property
Languagepython
Severitylow
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelLow
Impact LevelMedium
Likelihood LevelLow

Description#

The code passes user-controlled input (such as environment variables or command-line arguments) directly to asyncio.create_subprocess_exec without proper sanitization. This allows untrusted data to influence system commands executed by your application.

Impact#

An attacker could inject malicious commands, leading to command execution on the server. This can result in data theft, unauthorized access, service disruption, or full system compromise, putting both your application’s data and infrastructure at risk.