The vulnerability is a path traversal in the applicationData API, specific to Windows environments. The root cause lies in two functions within src/interfaces/applicationData.js. First, the validateAppId function failed to block backslashes (\) in the appid parameter, only checking for forward slashes (/). Since Windows treats both as path separators, an attacker could craft an appid with ..\ sequences to navigate up the directory structure. Second, the pathForApplicationData function used the tainted appid directly in a path.join() operation. This operation resolved the traversal sequences, creating a path pointing outside the intended storage directory. The patch addresses this by adding a backslash check in validateAppId and by normalizing the path in pathForApplicationData and verifying that the resolved path is still within the expected base directory, preventing the traversal.