AlchemyCMS: Authenticated Remote Code Execution (RCE) via eval injection in ResourcesHelper
A vulnerability was discovered during a manual security audit of the AlchemyCMS source code. The application uses the Ruby eval() function to dynamically execute a string provided by the resource_handler.engine_name attribute in Alchemy::ResourcesHelper#resource_url_proxy.