The vulnerability is a Server-Side Request Forgery (SSRF) in the Hemmelig application's webhook functionality. The root cause is twofold. First, the isPublicUrl function in api/lib/utils.ts performed insufficient validation. It checked webhook URLs against a regex blocklist of hostnames but failed to resolve these hostnames to their actual IP addresses. This flaw allowed attackers to use DNS rebinding techniques, where a domain name that initially resolves to a public IP can later resolve to an internal one, bypassing the check. The provided patch fixes this by resolving the hostname to its IP addresses (both IPv4 and IPv6) and checking those IPs against a list of private ranges. Second, the functions responsible for sending the webhooks, sendSecretRequestWebhook and sendWebhook, did not disable HTTP redirects. This allowed another bypass vector where an attacker could provide a valid public URL which then redirects the server's request to an internal IP address. The patch mitigates this by adding redirect: 'error' to the fetch calls in these functions, preventing them from following any redirects. The combination of these two weaknesses allowed an authenticated user to cause the server to make requests to arbitrary internal network resources.