{"id":"UBUNTU-CVE-2021-45845","details":"The Path Sanity Check script of FreeCAD 0.19 is vulnerable to OS command injection, allowing an attacker to execute arbitrary commands via a crafted FCStd document.","modified":"2025-09-08T16:47:27Z","published":"2022-01-25T13:15:00Z","upstream":["CVE-2021-45845"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-45845"},{"type":"REPORT","url":"https://tracker.freecad.org/view.php?id=4810"},{"type":"REPORT","url":"https://github.com/FreeCAD/FreeCAD/pull/5306"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2021-45845"}],"affected":[{"package":{"name":"freecad","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/freecad@0.19.2+dfsg1-3ubuntu1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["0.19.1+dfsg1-2","0.19.2+dfsg1-3","0.19.2+dfsg1-3ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"freecad","binary_version":"0.19.2+dfsg1-3ubuntu1"},{"binary_name":"freecad-common","binary_version":"0.19.2+dfsg1-3ubuntu1"},{"binary_name":"freecad-python3","binary_version":"0.19.2+dfsg1-3ubuntu1"},{"binary_name":"libfreecad-python3-0.19","binary_version":"0.19.2+dfsg1-3ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-45845.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}