The analysis started by examining the commits associated with the vulnerability. The primary commit referenced in the advisory was a test fix. By investigating the associated pull request, the core commit containing the security fix was identified. The patch was located in the getWritable method of the org.keycloak.userprofile.DefaultAttributes class. The original code contained a logical flaw that incorrectly identified unmanaged user attributes as writable, even when the administrative policy was set to view-only. This allowed an attacker with limited privileges to modify attributes they should not have access to. Although the vulnerability description focuses on data retrieval, the provided patch and associated pull request title clearly indicate a fix for a writing vulnerability. The test cases added in the patch confirm that with an ADMIN_VIEW policy, unmanaged attributes are still retrieved but are no longer writable. It is highly probable that the vulnerable getWritable method was also used by the attribute retrieval endpoint (/unmanagedAttributes), causing both an information disclosure and a privilege escalation vulnerability. The fix replaces the faulty logic with a call to isReadOnly(name), which correctly enforces the configured security policies.