The vulnerability, identified as GHSA-x3vm-88hf-gpxp, concerns sensitive data exposure in Directus's Flow feature. The core of the issue lies in the 'Log to Console' operation, which failed to redact sensitive information before logging. The provided patch commit 859f664f56fb50401c407b095889cea38ff580e5 clearly points to the api/src/flows.ts file and the FlowManager.executeOperation method as the place where the fix was implemented.
My analysis of the commit diff shows that a new logic block was added specifically for operations of type log. This new block uses a redactObject utility to sanitize the data (keyedData) before it is passed to applyOptionsData, which prepares the data for the logging handler. The vulnerable version of the code passed the raw, unredacted keyedData directly to applyOptionsData. Therefore, any runtime profile capturing the exploitation of this vulnerability would show FlowManager.executeOperation being called to process the malicious 'log' operation. This makes it the precise vulnerable function. The root cause is the lack of output sanitization for data used in a logging feature.