The vulnerability exists because the Fugue RPC server, implemented using Flask, unsafely deserializes data received from clients. The analysis of the source code for fugue/rpc/flask.py confirms the vulnerability description. The _decode function uses cloudpickle.loads on user-controlled input without any validation or sanitization. An attacker can send a specially crafted, base64-encoded pickle object to the server. The FlaskRPCServer._invoke method, which handles incoming RPC calls, retrieves this payload from the request and passes it to _decode. When cloudpickle.loads deserializes the malicious payload, it executes the embedded code, leading to remote code execution on the server. The provided commit 6f25326779fd1f528198098d6287c5a863176fc0 only adds security warnings and does not patch the underlying deserialization vulnerability, which was confirmed by fetching the file content directly from the repository.