An unauthenticated attacker can upload a malicious file to the server which when accessed by a victim can allow an attacker to completely compromise system.
https://support.sap.com/en/my-support/knowledge-base/security-notes-news/may-2024.html
https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html