The vulnerability is a SQL injection in the geopandas library when writing data to a PostGIS database. The root cause is the improper construction of a SQL query in the _write_postgis function, located in geopandas/io/sql.py. The geom_name parameter, which can be controlled by the user (as it represents the name of the geometry column in the GeoDataFrame), was directly interpolated into the SQL string for the Find_SRID function. This allowed for arbitrary SQL to be injected. The fix, as seen in commit 6aa8ef14ffdee4ba1044349ab948e1a1fbfaf419, was to replace the unsafe f-string formatting with a parameterized query using SQLAlchemy's text and bindparams constructs. This ensures that the geom_name is treated as a literal string and not as executable SQL code. The public-facing API for this operation is the GeoDataFrame.to_postgis() method, which would be the entry point for an exploit and would appear in any runtime profile or stack trace when the vulnerability is triggered.