Property
Languagepython
Severityhigh
CWECWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)
OWASPA01:2017 - Injection
Confidence LevelMedium
Impact LevelMedium
Likelihood LevelHigh

Description#

User-controlled input from an event object is being passed directly to an asyncio subprocess shell function. This allows untrusted data to be executed as part of a system command, creating a command injection risk.

Impact#

If exploited, an attacker could run arbitrary system commands on the server, potentially accessing sensitive data, modifying files, or taking control of the application environment. This can lead to data breaches, service disruption, or full system compromise.