This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Schneider Electric U.motion Builder. Authentication is not required to exploit this vulnerability. The specific flaw exists within processing of loadtemplate.php, which is exposed on the web service with no authentication. The underlying SQLite database query is subject to SQL injection on the tpl input parameter. A remote attacker can leverage this vulnerability to execute arbitrary commands against the database.