The vulnerability lies in the filemanager's handling of file operations, specifically 'rename' and 'preview'. The core of the issue is a path traversal vulnerability. The rename function did not validate the destination path, allowing an attacker to move a file to any directory on the server and change its extension. This bypasses the file upload restrictions, which are likely checked by is_allowed_file_type() during the initial upload but not during the rename operation. The exploit PoC confirms this two-step process: upload a seemingly harmless file, then rename it to a malicious file type (e.g., .php) and move it to a web-accessible location using path traversal patterns like ....//. The preview function was also vulnerable to path traversal, allowing arbitrary file disclosure. The patches confirm this analysis by adding path validation using the is_valid_path() function in both rename() and preview() methods within connectors/php/filemanager.class.php.