Zoraxy: Authenticated Path Traversal in Config Import leads to RCE
An authenticated path traversal vulnerability in the configuration import endpoint allows an authenticated user to write arbitrary files outside the config directory, which can lead to RCE by creating a plugin.