The vulnerability stems from insufficient authorization checks in user management workflows. Key functions were identified through: 1) The pattern of privilege escalation requiring user profile modification capabilities 2) RuoYi's architecture where user/role management is handled in system module 3) Typical Spring Boot patterns where controllers handle HTTP requests and services implement business logic 4) The CWE-863 description indicating missing authorization checks during role assignment operations. The high-confidence functions handle core user update operations, while the medium-confidence role service function enables attackers to discover privileged roles to target.