This vulnerability allows authenticated attackers to read an arbitrary file by changing a filepath parameter into an internal system path.