The vulnerability lies in the Merge node's SQL query mode, which uses the alasql library to execute user-provided SQL queries. The alasql library, by default, has features that can be abused for remote code execution, such as reading and writing files, and requiring modules. The patch addresses this by introducing a series of security measures within the packages/nodes-base/nodes/Merge/v3/actions/mode/combineBySql.ts file. The main vulnerable function is execute, as it is the entry point for processing the user's SQL query. The patch modifies this function to no longer use a raw alasql instance. Instead, it calls a new loadAlaSql function. This function, in turn, calls disableUnsafeAccess and freezeAlasql to create a sandboxed version of alasql with dangerous features disabled. Therefore, any runtime profile of an exploitation attempt would have the execute function in its stack trace, as it is the function that orchestrates the execution of the malicious query.