Talk to our security experts and see Miggo in action.
The patches indicate that the vulnerability was addressed by modifying the user selection and validation logic in the webservice token creation process. The functions identified are directly related to these changes.
The webservices functionality in Moodle 2.0.x before 2.0.7, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 allows remote authenticated users to bypass the deleted status and continue using a server via a token.