If exploited, this vulnerability might permit code execution with the privileges of the authenticated user
phew
.. and may therefore allow bypassing restricted shell/command
phew
.. and may therefore allow bypassing restricted shell/command