The vulnerability exists in the McpTokenService where the get, regenerateToken, and delete methods failed to validate token ownership. The security advisory explicitly mentioned these functions. By analyzing the patch commit 4e736ee40951c7b4f9760f372780e0712c44b9dd, I confirmed that the fix for this vulnerability was to add an ownership check in these three functions. The patch modifies mcp.service.ts to include a check comparing the fk_user_id on the token with the id of the user making the request (req.user.id). Before the patch, these functions would operate on any token as long as the token ID was valid, allowing a user with a 'Creator' role to read, regenerate, or delete tokens belonging to other users within the same base. The changes in McpGet.operations.ts and McpPost.operations.ts are to pass the request object (req) down to the service layer so the ownership check can be performed.