0 and labeled as important. This challenge impacts some unidentified processing on the file /classes/Consumers.php?file=conserve. The manipulation with the argument img causes unrestricted upload. The assault may be initiated remotely. The exploit continues to be disclosed to the general public and should be employed. The connected identifier of this vulnerability https://pikb603ggg5.wikijm.com/user