The vulnerability lies in the authentication middleware of OpenFlagr, specifically within the whitelist methods of the jwtAuth and basicAuth structs located in pkg/config/middleware.go. These methods are responsible for determining if an incoming HTTP request can bypass authentication based on its URL path. The flaw stemmed from the use of strings.HasPrefix for checking if a request path matched any of the configured whitelisted prefixes. This function performs a simple string comparison and does not account for path normalization. As a result, an attacker could craft a malicious URL containing path traversal elements (e.g., /whitelisted_prefix/../protected_endpoint). The strings.HasPrefix check would incorrectly identify the path as whitelisted, granting unauthorized access to protected API endpoints. The patch addresses this by introducing a new function, util.HasSafePrefix, which uses path.Clean to normalize the URL path before performing the prefix check. This ensures that path traversal sequences are resolved before the whitelist check is performed, effectively closing the authentication bypass vulnerability.