An attacker could exploit this vulnerability by uploading...
        
  Moderate severity
        
          Unreviewed
      
        Published
          Aug 21, 2025 
          to the GitHub Advisory Database
          •
          Updated Aug 21, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Aug 21, 2025 
    
  
        Published to the GitHub Advisory Database
      Aug 21, 2025 
    
  
        Last updated
      Aug 21, 2025 
    
  
An attacker could exploit this vulnerability by uploading arbitrary
files via the a specific endpoint, leading to unauthorized remote code
execution or system compromise.
References