The vulnerability stems from improper path normalization in HTTP security policy checks. Multiple sources (GitHub issue #35785, RHSB-2023-002) confirm that requests with adjacent slashes (e.g., '//q/openapi') bypass security policies. The mitigation involves explicitly checking if the raw path matches the normalized path, indicating the core security logic lacked this normalization. The HttpSecurityPolicy implementations in both Vert.x HTTP and Undertow modules are responsible for path-based authorization checks and would be the logical points where path normalization was missing. The high confidence comes from Red Hat's own mitigation examples showing the need to compare request.path() with normalizedPath(), implying these functions used the raw path for policy evaluation.