The vulnerability exists because two internal API endpoints, /api/internal/sftp-event and /api/internal/sftp-auth, were exposed to the public internet without proper authorization checks. These endpoints are handled by the SftpEventAction and SftpAuthAction controllers, respectively. The patch, found in commit 34620dbad93f6cd8e209a4220e3e53c7c5fea844, introduces a new middleware, RequireInternalConnection, to both routes. This middleware validates that incoming requests originate from an internal source by checking a server parameter, effectively blocking external access. The primary vulnerable function, App\Controller\Api\Internal\SftpEventAction::__invoke, would process a pre-delete event from an unauthenticated attacker, leading to the deletion of media file records from the database. The App\Controller\Api\Internal\SftpAuthAction::__invoke function was also exposed and patched, and while the direct impact is not detailed in the advisory, its exposure as an internal authentication endpoint presents a clear security risk.