A vulnerability has been identified in Web3news, which could be exploited by attackers to execute arbitrary commands. This flaw is due to an input validation error in the "security/include/_class.security.php" script that fails to validate the "PHPSECURITYADMIN_PATH" parameter, which could be exploited by remote attackers to include malicious files and execute arbitrary commands with the privileges of the web server.
Vulnerable Products
Vulnerable Software: Web3news version 0.95 and prior