The vulnerability, CVE-2025-41436, allowed regular users to access content in archived channels, even when the system setting 'Allow users to view archived channels' was disabled. The exploit path involved the 'Open in Channel' feature for followed threads. The root cause was the inconsistent and bypassable enforcement of this configuration setting across the application.
The patch addresses this by completely removing the 'ExperimentalViewArchivedChannels' setting and its associated logic. The new behavior is to always allow users who were members of a channel before its archival to access its content. This simplifies the authorization model and eliminates the possibility of bypass.
The identified vulnerable functions are those that were responsible for enforcing the now-removed security control. For example, app.SessionHasPermissionToChannelByPost and api4.getPostsForChannel contained checks against ExperimentalViewArchivedChannels that were removed in the patch. These functions, and others like them, were part of the flawed security boundary that allowed unauthorized access to archived channel data.