The security advisory describes a timing-based user enumeration vulnerability in the password reset functionality of Directus. The provided commit e69aa7a5248c6e3e822cb1ac354dee295df90b2a directly addresses this issue. The patch modifies the api/src/services/users.ts file, specifically within the UsersService.requestPasswordReset function. The change involves reordering the operations: the validation of the reset_url parameter is moved to before the database query that searches for the user. In the vulnerable version, the user lookup was performed first. This meant that a request with an invalid URL would have a different response time depending on whether the user existed (slower, due to database query) or not (faster). This timing discrepancy could be exploited to confirm the existence of user accounts. The identified vulnerable function, UsersService.requestPasswordReset, is the entry point for this flawed logic and would be the function appearing in a runtime profile during exploitation of this timing attack.