You can create malicious files if you can upload them, and then use that, see RCE.
Last updated 1 year ago