The vulnerability lies in the password reset functionality of NocoDB. The advisory explicitly mentions that the passwordReset() function in users.service.ts did not revoke existing refresh tokens. By analyzing the commits between the vulnerable version 0.301.2 and the patched version 0.301.3, I identified the security patch in commit dfbe836577354ba780563a5cf8cb50bfc61a203e. The patch adds a call to UserRefreshToken.deleteAllUserToken(user.id) within the passwordReset function in packages/nocodb/src/services/users/users.service.ts. This confirms that UsersService.passwordReset is the vulnerable function. When this function is called during a password reset, it previously left refresh tokens active, allowing an attacker with a stolen token to maintain access.