The vulnerability is an XSS issue in the OpenCode web UI, leading to local command execution. The core of the vulnerability is in the packages/app/src/app.tsx file, where the defaultServerUrl function takes a url parameter from the query string without any validation. An attacker can craft a URL to trick a user into loading a malicious chat session from an attacker-controlled server. The chat session contains a javascript payload in a markdown message, which is rendered without sanitization, leading to XSS on the localhost origin. From there, the javascript payload can use the /pty/ API to execute arbitrary commands on the user's machine. The provided patch commit is a release commit that bumps the package versions to 1.1.10. The vulnerability description states that this version disables the web UI, which is the mitigation for this vulnerability. Therefore, the vulnerable function defaultServerUrl is identified from the description of the vulnerability itself.