In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
{
"nvd_published_at": "2022-11-26T02:15:00Z",
"cwe_ids": [
"CWE-94"
],
"severity": "CRITICAL",
"github_reviewed_at": "2022-11-30T21:19:52Z",
"github_reviewed": true
}