The vulnerability centers on improper validation of user-supplied redirect paths. Drupal's drupal_goto() and drupal_get_destination() are core functions responsible for processing redirects. The advisory explicitly mentions path manipulation in the context of 404 error page forms and custom code, which aligns with how these functions handle the 'destination' parameter. Historical context from related CVEs (e.g., CVE-2016-3167 for double-encoded destinations) confirms that improper sanitization in these functions was a recurring issue. While exact patch details are unavailable, the functions' roles in redirect logic and the vulnerability description strongly implicate them.