The vulnerability lies in two separate controllers, ContentTypeController and DictionaryController, both of which have import functionalities that handle file paths insecurely. The methods Import and ImportDictionary respectively, took a user-provided file path and used it to check for a file's existence on the server. The application's response differed based on whether the file existed or not, creating a file enumeration oracle. An attacker with backoffice access could exploit this to map out the server's file system. The patch addresses this by ensuring that the user input is treated as a filename only, and not a path, by stripping any path-related characters and combining it with a fixed, trusted base directory. This prevents the path traversal and subsequent file enumeration.