This gives attackers the opportunity to smuggle malicious scripts onto your server. If they can subsequently find a way to execute those scripts, they can compromise your entire system.