The vulnerability allows a truncated opaque access token to be considered valid. The root cause is that the user_id from the token payload was not being validated against the user ID from the session data stored in the database. The provided patch feab8e1fa371f3ad654640fc869b2c14f2fdb602 modifies internal/authz/repository/eventsourcing/eventstore/token_verifier.go. The function verifyAccessTokenV2 is changed to accept a subject parameter, which is the user ID from the token. A new check is added to this function to compare this subject with the UserID from the activeToken (retrieved from the database). If they don't match, an "invalid token" error is thrown. The calling function, VerifyAccessToken, is also updated to extract the subject from the token and pass it to verifyAccessTokenV2. Therefore, both VerifyAccessToken and verifyAccessTokenV2 are the key functions involved in this vulnerability and its fix. During exploitation, a call to VerifyAccessToken would be present in the runtime profile, which in turn calls verifyAccessTokenV2.