The vulnerability, identified as GHSA-vw5p-8cq8-m7mv, is a denial-of-service weakness in the devalue library. The root cause is improper input validation within the unflatten function, which is internally called by the exported parse function. The patch analysis reveals that the logic for hydrating TypedArray objects was flawed. It did not verify that the input data it was processing was a valid ArrayBuffer. This oversight allows an attacker to craft a malicious JSON string where a TypedArray references itself or another object in a circular manner. When devalue.parse processes this string, the internal hydrate function within unflatten enters an infinite recursive loop while trying to resolve the circular dependency. This leads to uncontrolled resource consumption, exhausting CPU and memory, and ultimately causing the application to crash. The patch mitigates this by adding explicit checks to validate that the input for a TypedArray is indeed an ArrayBuffer and by adding checks to detect circular references, thus preventing the infinite recursion.