The vulnerability lies in the generateServer function within packages/mcp/src/index.ts. The function is responsible for generating server-side code for the MCP (Multi-Client Proxy). The analysis of the patch 80b5fe73b94f120a3a5561952d6d4b0f8d7e928d clearly shows that the summary field from an OpenAPI specification (verbOption.summary) was being used directly in a template string to generate code. The patch introduces the jsStringEscape function to sanitize this input, confirming that the lack of escaping was the root cause of the vulnerability. An attacker could craft a malicious OpenAPI file with a specially designed summary field to inject arbitrary code, which would then be executed when the orval CLI processes the file. The vulnerable function, generateServer, is the exact location where this malicious input is processed and integrated into executable code.