Sensitive documents intended for internal use are accessible via predictable URLs. Without proper authorisation checks, an attacker can directly retrieve files such as legal agreements or backups by navigating to hidden directories or guessing filenames.
/assets/pdfs/)./assets/pdfs/Legal_Doc.pdf.