An attacker could exploit this vulnerability by uploading arbitrary files via a specific service, which could lead to system compromise.
CVSS Metrics