The vulnerability lies in the docextractor.(*archiveExtractor).Extract function in server/platform/services/docextractor/archive.go. The function extracts files from an archive, and prior to the patch, it did not properly sanitize the filenames from the archive. Specifically, the line destPath := filepath.Join(tmpDir, f.Name()) is the culprit. An attacker could upload a specially crafted archive containing filenames with path traversal sequences (e.g., ../../some/path/file.txt). When this archive is processed, the Extract function would join the temporary directory path with the malicious filename, allowing the attacker to write a file outside of the intended temporary directory. This could lead to remote code execution if the attacker can overwrite a critical file. The fix involves sanitizing the filename using filepath.Base(f.Name()) before joining it with the temporary directory path. This ensures that any directory traversal sequences are stripped from the filename, mitigating the vulnerability.