The vulnerability exists in the Dev UI Config Editor's handling of configuration updates. The CWE-74/CWE-94 classification indicates improper neutralization of inputs used in code generation/execution. The quarkus-vertx-http-deployment module contains the Dev UI HTTP handlers. The maintainer-confirmed affected artifact and RCE via localhost attacks suggest the config update handlers directly process untrusted input. Functions handling JSON-RPC requests (ConfigJsonRPCHandler) and configuration processing (ConfigEditorProcessor) are prime candidates as they would be responsible for receiving and applying user-supplied configuration values without adequate sanitization.