The vulnerability, identified as CVE-2025-51471, is a cross-domain token exposure issue in Ollama. The root cause is the lack of domain validation when handling WWW-Authenticate headers during the model pulling process. The provided patch from pull request #10750 clearly shows the fix in the server/auth.go file. The registryChallenge.URL function was modified to include a check that compares the domain of the authentication realm with the domain of the service. This prevents the redirection of authentication tokens to a malicious actor's server. Although the CVE description mentions server.auth.getAuthorizationToken, the actual code change that mitigates the vulnerability is within the registryChallenge.URL method. It is highly likely that getAuthorizationToken calls registryChallenge.URL as part of the authentication flow, making registryChallenge.URL the precise location of the vulnerability.