The vulnerability exists in the untar function within workflow/executor/executor.go. The function is responsible for extracting tar archives, but it fails to properly validate the file paths of the contents of the archive. The vulnerability is a path traversal, also known as Zip Slip. An attacker can create a malicious tar archive with file paths that include ../ sequences. When the untar function extracts this archive, it concatenates the destination path with the malicious file path from the archive, allowing the attacker to write files to arbitrary locations on the filesystem, outside of the intended destination directory. The provided patches fix this vulnerability by adding a check to ensure that the resolved path of each extracted file is within the intended destination directory. The evidence from the commits clearly shows the addition of path validation logic within the untar function, confirming that this function was the source of the vulnerability.