0 and categorized as important. This situation influences some unidentified processing on the file /lessons/Customers.php?f=preserve. The manipulation with the argument img leads to unrestricted upload. The attack might be initiated remotely. The exploit has been disclosed to the general public and should be used. The linked identifier of this vulnerability https://emmaz581cde5.wikiinside.com/user