The vulnerability, identified as GHSA-vmc4-9828-r48r, is an SSRF flaw in Ghost's external media inlining feature. The provided patches (15d49131ff4aac3aca8642501c793f01f2bfcbb9 and 93add549ccf079d8e28bdb724fbb71a76942ff51) clearly show the mitigation. The core change is in ghost/core/core/server/services/media-inliner/ExternalMediaInliner.js, where the underlying HTTP request library is swapped from @tryghost/request to a more restrictive internal library, request-external. The commit message explicitly states this is to block requests to internal IP blocks. Furthermore, the added unit test targets the getRemoteMedia method within the ExternalMediaInliner class, simulating a DNS lookup that resolves to a private IP and asserting that the request is blocked. This pinpoints ExternalMediaInliner.getRemoteMedia as the function that performs the outbound request and was therefore the source of the SSRF vulnerability. During exploitation, a call to this function with a malicious URL would appear in a runtime profile.