Medium
CVSS 4.6
Overview
Jetbox One 2.0.8 and possibly other versions allow remote attackers with Author privileges in the IMAGES module to upload PHP files and execute arbitrary code.
Jetbox One 2.0.8 and possibly other versions allow remote attackers with Author ...
Jetbox One 2.0.8 and possibly other versions allow remote attackers with Author privileges in the IMAGES module to upload PHP files and execute arbitrary code.
This vulnerability is rated 🟡 MEDIUM.
Recommended actions: