5 vulnerabilities classified as CWE-627 (动态变量执行). AI Chinese analysis included.
CWE-627 represents a critical input validation weakness occurring in dynamic programming environments where user-supplied data directly influences variable names at runtime. This flaw allows attackers to manipulate the execution context by injecting malicious strings that resolve to arbitrary variables or functions, bypassing intended security controls. Exploitation typically involves crafting specific payloads that trick the interpreter into accessing sensitive memory locations or executing unintended code paths, potentially leading to data exfiltration or remote code execution. To mitigate this risk, developers must rigorously sanitize all user inputs before they are used in dynamic evaluation contexts. Implementing strict allowlists for permitted variable names, avoiding direct concatenation of user data into variable references, and utilizing static analysis tools to detect unsafe dynamic evaluations are essential practices for preventing this vulnerability and ensuring application integrity.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-2452 | Unsafe variable evaluation in email templates — pretix-newsletter | 7.5AI | HighAI | 2026-02-16 |
| CVE-2026-2451 | Unsafe variable evaluation in email templates — pretix-doistep | 7.5AI | HighAI | 2026-02-16 |
| CVE-2026-2415 | Unsafe variable evaluation in email templates — pretix | 7.5AI | HighAI | 2026-02-16 |
| CVE-2024-8953 | Unsafe eval usage in composiohq/composio — composiohq/composio | 9.8 | - | 2025-03-20 |
| CVE-2023-31032 | CVE — DGX A100 | 7.5 | High | 2024-01-12 |
Vulnerabilities classified as CWE-627 (动态变量执行) represent 5 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.