reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
https://www.mattz.io/posts/cve-2023-50094/
https://github.com/yogeshojha/rengine/security/advisories/GHSA-fx7f-f735-vgh4
https://github.com/yogeshojha/rengine/security
https://github.com/yogeshojha/rengine/releases
https://github.com/yogeshojha/rengine/commit/edd3c85ee16f93804ad38dac5602549d2d30a93e
https://github.com/yogeshojha/rengine/commit/3d5f1724dd12cf9861443742e7d7c02ff8c75a6f