engine: common: allow cvar substituion in privileged mode only to prevent leaking sensitive data

This commit is contained in:
Alibek Omarov 2022-12-12 08:14:01 +03:00
parent a3ef6c955c
commit cb0f513bf0
1 changed files with 1 additions and 1 deletions

View File

@ -984,7 +984,7 @@ static void Cmd_ExecuteStringWithPrivilegeCheck( const char *text, qboolean isPr
cmd_condlevel = 0;
// cvar value substitution
if( CVAR_TO_BOOL( cmd_scripting ))
if( CVAR_TO_BOOL( cmd_scripting ) && isPrivileged )
{
while( *text )
{