The vulnerability allows users to view member information of archived channels even when the system setting 'Allow users to view/update archived channels' (internally ExperimentalViewArchivedChannels) is disabled. The provided commit ae8a952bcaaa5f77a92043e2538f625eac72e927 directly addresses this by modifying several authorization functions in server/channels/app/authorization.go. The changes involve introducing a new helper function isChannelArchivedAndHidden (which combines the channel's archived status channel.DeleteAt != 0 and the system setting !*a.Config().TeamSettings.ExperimentalViewArchivedChannels) and using it to enforce stricter checks in SessionHasPermissionToChannel, SessionHasPermissionToChannels, HasPermissionToReadChannel, and HasPermissionToChannelMemberCount. These functions, in their pre-patch state, lacked these comprehensive checks, leading to the incorrect authorization. The vulnerability description specifically mentions viewing 'members and member information', which aligns with the purpose of HasPermissionToReadChannel (general channel access) and HasPermissionToChannelMemberCount (specific to member counts). The SessionHasPermissionToChannel(s) functions are broader permission gates that would also be involved.