The vulnerability exists in the Lesson edit page (CWE-601 open redirect). Moodle's security advisory MSA-19-0027 specifically references the Lesson module's edit functionality. In Moodle's architecture, post-action redirects typically use a 'redirect' parameter. The vulnerability likely occurs where this parameter is processed without proper validation using Moodle's url sanitization functions (e.g., clean_param with PARAM_LOCALURL). The function name follows Moodle's pattern for edit action handlers (mod_[module]_edit_post_actions), and edit.php is the standard entry point for lesson editing. While exact code isn't available, this matches the vulnerability pattern and Moodle's module structure.