A vulnerability has been discovered in Dolphin, which can be exploited by malicious users to compromise a vulnerable system.
Input passed via the "bubbles" parameter to member_menu_queries.php (when "action" is set to "get_bubbles_values") is not properly sanitised before being used in an "eval()" call. This can be exploited to execute arbitrary PHP code.
The vulnerability is confirmed in version 7.0.7. Other versions may also be affected.