The vulnerability is a Server-Side Request Forgery (SSRF) within the media proxy feature of Miniflux. The analysis of the security advisory and the associated patch commit pinpoints the handler.mediaProxy function in internal/ui/proxy.go as the exact location of the vulnerability. The advisory explicitly names this function as the handler for the vulnerable /proxy route. The provided patch commit 6c83e8c477b4d476aee5fbb87e47472c9ded01de confirms this by adding IP address validation logic directly within this function. Specifically, the patch introduces a call to urllib.ResolvesToPrivateIP to check if the hostname of the requested media URL resolves to a private, loopback, or otherwise non-public IP address. Before this change, the function lacked this check, allowing it to fetch resources from internal network locations accessible to the Miniflux server. Therefore, any runtime profile during the exploitation of this SSRF vulnerability would show the handler.mediaProxy function in the stack trace as it processes the malicious proxy request.