The vulnerability is a Denial of Service (DoS) caused by a resource leak in Apache Struts' multipart request handling. When processing a multipart/form-data request, the underlying commons-fileupload library may create temporary files on disk for any of the parts, including regular form fields, not just file uploads. The vulnerability lies in the cleanUp method of the org.apache.struts2.dispatcher.multipart.JakartaMultiPartRequest class. The original implementation only cleaned up temporary files associated with actual file uploads, completely ignoring the temporary files created for other form fields. This allowed an attacker to send a series of multipart requests containing form fields that would be written to disk, exhausting the available disk space and causing a DoS. The patch addresses this by introducing a list, allFileItems, to track every single FileItem created during the request processing in the processUpload method. The cleanUp method was then rewritten to iterate through this comprehensive list, ensuring that all temporary files, regardless of whether they are from a file upload or a form field, are properly deleted. The primary vulnerable function is cleanUp due to its incomplete logic, and parse is the entry point that triggers the vulnerable process.