The vulnerability is a Server-Side Request Forgery (SSRF) located in webpack's HttpUriPlugin, which is activated when experiments.buildHttp is enabled. The root cause is the failure to re-validate URLs against the allowedUris configuration after an HTTP 3xx redirect. The initial resource URL is correctly checked, but if it redirects, the new URL specified in the Location header is trusted and fetched without a security check. This allows an attacker to use an allowed domain as an open redirect to access internal or otherwise restricted network resources from the build server. The provided patch rectifies this by introducing validation logic within the redirect handling code. Specifically, a new validateRedirectLocation function is added and called from within the fetch and resolveContent closures inside HttpUriPlugin.apply. This ensures that any redirected URL is checked against the allowedUris policy, is a valid http(s) URL, and does not exceed a new maximum redirect limit, effectively closing the SSRF loophole.