An authenticated user can add and execute a malicious script on an HTML page through a vulnerable CLI command due to lack of data validation.
An authenticated user can add and execute a malicious script on an HTML page through a vulnerable CLI command due to lack of data validation.