The vulnerability description explicitly mentions URL encoding exploitation leading to 302 redirects. This strongly suggests the issue resides in a URL redirection handler. In web frameworks like Gradio, route handlers managing redirect parameters (e.g., OAuth callbacks, login redirects) are common vectors. The function name 'redirect_to_url' is a logical candidate, as it would directly process redirect targets. The confidence is high because: (1) Open redirects inherently require a redirect function to handle untrusted input, (2) The CWE-601 mapping confirms this pattern, and (3) The exploit mechanics (URL encoding bypass) align with insufficient validation in a URL parsing/redirect function.