The vulnerability stems from a missing authentication check in the Frosh\Adminer\Controller\AdminerController. The index function, which serves the Adminer UI, was accessible without any authentication. The associated route was explicitly marked with auth_required=false, and the function body did not contain any logic to verify if the user had an active administrative session. The patch rectifies this by introducing a session-based check. The login function was modified to set a session variable (frosh_adminer_authenticated) upon successful authentication. Subsequently, the index function was updated to check for this session variable's existence, returning a 403 Forbidden status if it is not present. This ensures that only authenticated users can access the Adminer interface. The primary vulnerable function is Frosh\Adminer\Controller\AdminerController::index as it was the unprotected entry point to the sensitive UI.