DescriptionApache Continuum versions up to and including 1.4.2 contain an OS command injection vulnerability in the /continuum/saveInstallation.action endpoint. By supplying crafted input in the installation.varValue POST parameter, an authenticated attacker can inject and execute arbitrary shell commands on the underlying server with the privileges of the Continuum service, potentially leading to full system compromise. Exploitation evidence was first observed by the Shadowserver Foundation on 2026-01-07 (UTC) in connection with the RondoDox botnet.