0 and classified as crucial. This concern impacts some unidentified processing in the file /classes/Customers.php?f=save. The manipulation of the argument img leads to unrestricted add. The assault can be initiated remotely. The exploit has actually been disclosed to the public and will be utilized. The associated identifier of the vulnerability is