The vulnerability lies in several public API endpoints that expose non-public information. The analysis focused on the commits between the vulnerable version 4.0.16 and the patched version 4.0.17. The key commit 0ef9f3eaf2f41d58cbe92187c7c7ccd4369cf50a provided clear evidence of the vulnerability and its fix. The patch modified the OpenQuestionController::list() method, changing the call from $question->getAll() to $question->getAll(false). This directly corresponds to the vulnerability description, which states that OpenQuestionController::list() was calling Question::getAll() with the default showAll=true, leading to the exposure of invisible questions. The identified vulnerable function, phpMyFAQ\Controller\Api\OpenQuestionController::list, is the entry point for the reported exploit PoC. While the advisory mentions similar issues in other API endpoints (comment, news, faq), no corresponding patches were found in the analyzed commit range. Therefore, the analysis is confined to the function with direct evidence.