The vulnerability stems from improper path sanitization in the Location class. The original implementation of Location.of() lacked sufficient checks for path traversal sequences (like '..') and special characters (e.g., '\' and ':'). The commit diff shows critical changes to this method, including the addition of regex patterns to replace multiple directory operators (e.g., '....') and normalization steps. The CWE-22 classification and advisory explicitly attribute the vulnerability to path traversal during javadoc file handling, which relies on Location's path resolution. The test cases in LocationTest.kt were also updated to reflect the new sanitization behavior, confirming this was the root cause.