An attacker with low privileges can exploit the weakness in internally used text extraction reports (Translation Tools) which will enable the execution of arbitrary commands in the background. An attacker could thereby control the behavior of the application compromising all its data.