The affected product is vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute code.