A node does not check if an image is allowed to run if a parent_id is set. A malicious party that breaches the server may modify it to set a fake parent_id and send a task of a non-whitelisted algorithm. The node will then execute it because the parent_id that is set prevents checks from being run. Relevant node code here
This impacts all servers that are breached by an expert user
Fixed in v4.1.2
None
{
"nvd_published_at": "2023-11-14T21:15:13Z",
"severity": "HIGH",
"cwe_ids": [
"CWE-345",
"CWE-358"
],
"github_reviewed_at": "2023-11-14T22:21:57Z",
"github_reviewed": true
}