The vulnerability, CVE-2025-68943, allows unauthorized users to view sensitive user activity information, specifically their last login times, by manipulating the 'sort' parameter on the user and organization exploration pages. The root cause was a lack of input validation on this parameter.
The analysis of the patches reveals that the Users function in routers/web/explore/user.go and the Organizations function in routers/web/explore/org.go were the primary entry points for this vulnerability. These functions accepted the 'sort' parameter from the URL query string but did not validate it against a safe list of allowed values. The unsanitized parameter was then passed to the RenderUserSearch function, which constructed the database query. This allowed sorting by fields not intended to be public, such as lastlogintime.
The fix, implemented across several commits, introduces a strict whitelist of allowed sort orders (newest, oldest, alphabetically, reversealphabetically). Any attempt to use a sort order not on this list now results in a "Not Found" error. The vulnerable functions were those that handled the user request and failed to properly sanitize the input, leading to the information disclosure.