A remote unauthorized attacker may gather sensitive information of the application, due to missing authorization of configuration settings of the product.
The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboard widgets can inject malicious JavaScript code into the Transform Function which will be executed when the widget receives data from its data source.