The vulnerability lies in the direct use of unserialize() on base64 decoded input within several methods of the repository_equella class in repository/equella/lib.php. The patch (commit 630fbf6230ee18d63ce69bea34173fb151b599da) replaces these direct calls with a new helper method unserialize_reference, which uses unserialize_object(). This change indicates that the previous direct unserialize() calls were susceptible to PHP object injection if the input (file reference) could be controlled by an attacker. The functions get_file, sync_reference, send_file, and get_reference_details all contained this vulnerable pattern before the patch and are therefore identified as vulnerable.