Impact
A code injection flaw exists in the runJSFile function of the JSON webhook component. By crafting a malicious value for the rawcode argument, an attacker can cause the server to execute arbitrary JavaScript code. This directly permits remote code execution, jeopardizing the confidentiality, integrity, and availability of the affected system.
Affected Systems
ElecV2 and ElecV2P products up to version 3.8.3 are affected. Any installation that uses the /webhook endpoint and has not applied a newer release is vulnerable.
Risk and Exploitability
The CVSS score of 5.3 reflects medium severity, but the vulnerability is exploitable remotely over the network and the exploit code is now publicly available. No EPSS data is available and the issue is not listed in the CISA KEV catalog. The attack vector is inferred to be remote and network‑based, likely targeting the JSON webhook endpoint from external clients.
OpenCVE Enrichment