This indicates an attack attempt to exploit an Arbitrary File Upload vulnerability in DotCMS.
The vulnerability is caused by a lack of sanitizing the "filename" parameter that is passed to "ajax_file_upload". A remote attacker can exploit this to send a crafted HTTP POST request to execute arbitrary code on vulnerable systems.
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.