The vulnerability is a classic Server-Side Template Injection (SSTI) within Kimai's export functionality. The root cause lies in the App\Twig\SecurityPolicy\DefaultPolicy class, which was used by the Twig sandbox for security checks during template rendering. Crucially, the checkMethodAllowed and checkPropertyAllowed methods within this policy were empty, effectively disabling any security restrictions. This allowed an attacker with permissions to control export templates to execute arbitrary code on the server by embedding malicious Twig syntax in a template file. The exploit demonstrates the ability to access sensitive environment variables (APP_SECRET, DATABASE_URL), all user password hashes, and session tokens. The patch remediates this by adding strict validation logic to the DefaultPolicy to block access to sensitive objects and methods, following a deny-by-default approach.