The vulnerability allows hackers to upload arbitrary files to a site’s server and achieve remote code execution.