A vulnerability has been identified in docpile:we, which could be exploited by attackers to execute arbitrary commands. This flaw is due to input validation errors in various scripts (e.g. "lib/access.inc.php") that fail to validate the "INIT_PATH" parameter, which could be exploited by remote attackers to include malicious files and execute arbitrary commands with the privileges of the web server.
Vulnerable Products
Vulnerable Software: docpile:we version 0.2.2 and prior