Severity: HIGH
Description: An authentication bypass vulnerability could allow an attacker to access API functions without authentication.
CVSS Score: 7.3
Severity: HIGH
Description: A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially crafted API request.
CVSS Score: 7.2