The vulnerability exists in the 'Git' node of n8n. Specifically, the execute method of the Git class does not sanitize the output of the git.listConfig() command. The patch commits 7860896909b3d42993a36297f053d2b0e633235d and 936c06cfc1ad269a89e8ef7f8ac79c104436d54b address this by introducing a new function sanitizeUrl which strips credentials from git remote URLs, and a function mapGitConfigList that applies this sanitization. The vulnerable code in Git.node.ts is a loop that iterates over the configuration values and adds them to the output. This loop is replaced by a call to the new mapGitConfigList function. An attacker could create a git repository with a malicious remote URL containing an n8n expression in the user-info part. When a user configures the n8n Git node to interact with this repository and lists the configuration, the malicious expression is injected into the workflow's data. Subsequent processing of this data by the n8n expression engine leads to RCE. Therefore, the Git.execute function is the vulnerable function as it's responsible for introducing the malicious data into the system.