The vulnerability stems from Dynamic LINQ's expression parser allowing method invocation on arbitrary types when processing untrusted input. The named methods (Where/Select/OrderBy) accept string parameters that get parsed into expression trees without proper security restrictions. Attackers can craft inputs that leverage C#-like syntax to invoke dangerous static methods (System.IO.File.WriteAllText). The CWE-697 (Incorrect Comparison) manifests as improper validation of allowed types/methods during expression parsing. The 1.3.0 patch introduced type allowlisting via [DynamicLinqType] attributes and security restrictions, confirming these methods were the attack surface.