Path Traversal successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of the restricted directory on the remote server.
Note: If you can not see the poc image , you can follow this link https://imgur.com/a/1svTNB4