org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28617.json"