EPrints 3.4.2 allows remote attackers to read arbitrary files and possibly execute commands via crafted JSON/XML input to a cgi/ajax/phrase URI.
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:eprints:eprints:3.4.2:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.4.2"
}
]
}