KEN! contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.
Upgrade to version 1.04.32 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.