Use front-end vulnerabilities to trigger back-end remote command execution