The vulnerability stems from Flask endpoints lacking CSRF protections. The save() function in debug.py is particularly critical because it allows modifying project scripts through a POST request. Since pyspider uses Basic Authentication without additional CSRF mitigations, the browser automatically includes credentials in cross-origin requests. This combination allows attackers to craft malicious pages that trigger script modifications when visited by authenticated users. The SonarSource blog explicitly links CSRF exploitation to code execution, and the debug.py file's /save endpoint (line 39 reference in advisory) is the logical point where this vulnerability would be implemented.