The vulnerability stems from improper input validation and unrestricted file uploads. The patch explicitly adds 'application/octet-stream' to FILE_VALIDATORS with a 'deny' rule, indicating this MIME type was previously unvalidated. The test cases in test_admin.py confirm that binary uploads were allowed by default in vulnerable versions. The core issue lies in the validation logic (filer.validation.validate_file) and the upload handler (FileAdmin.ajax_upload), which relied on incomplete FILE_VALIDATORS settings. The high confidence for validate_file is due to its direct role in MIME-type validation, while the medium confidence for ajax_upload reflects its indirect role in processing unvalidated uploads.