The vulnerability is a SQL injection flaw within the ElementIndexesController.php file of Craft CMS. The analysis of the provided patch commit 96c60d775c644ff0a0276da52fe29e11d4cd38d2 reveals that the elementQuery function was modified to prevent this vulnerability. The endpoint /admin/actions/element-indexes/get-elements is handled by the actionGetElements method in this controller, which in turn calls elementQuery to construct the database query. The vulnerability description and the PoC confirm that the criteria[orderBy] parameter in the JSON body of the POST request is the injection vector. The patch addresses the vulnerability by adding code to the elementQuery function to remove the orderBy key from the user-supplied $criteria array before it is used to build the SQL query. This directly pinpoints craft\controllers\ElementIndexesController::elementQuery as the function where the vulnerable code existed and was subsequently patched. During exploitation, this function would process the malicious orderBy parameter, making it a key indicator in a runtime profile.