The vulnerability lies in the bulk import functionality of Mattermost, specifically in how it handles thread followers for imported posts. The advisory mentions a 'Lack of Access Control Validation', and the patch analysis confirms this. The functions ValidatePostImportData and ValidateDirectPostImportData in server/channels/app/imports/import_validators.go were not validating the ThreadFollowers field in the import data. This allowed an attacker to add themselves as a follower to any thread, including those in private channels or direct messages they are not a part of. The fix introduces a new function, ValidateThreadFollowerImportData, and calls it from the two vulnerable functions to ensure that the user being added as a follower is valid. The vulnerability could be exploited by crafting a malicious bulk import file and using the import feature, which could be triggered by an AI post or other means.