The vulnerability lies in the JWE tokens not having an internal expiration claim (exp). The commit a4f061aed02ffa132feca8adfbd11704df17e1c3 addresses this by modifying the core encrypt function in src/server/cookies.ts to add .setExpirationTime() during JWE creation. Consequently, all functions that use encrypt to create session or transaction cookies were previously creating tokens without this internal expiration. The identified functions (StatefulSessionStore.set, StatelessSessionStore.set, StatelessSessionStore.setCookie, TransactionStore.create, and the testing utility generateSessionCookie) were all modified to pass an expiration time to the updated encrypt function. Therefore, their previous versions were involved in generating the vulnerable, non-expiring JWEs. The encrypt function itself is the most direct location of the vulnerability (missing logic), while the other listed functions are those that utilized this flawed mechanism.