The vulnerability exists because the 'Duplicate' element action in Craft CMS failed to verify user permissions before duplicating an entry. The analysis of the patch commit fb61a91357f5761c852400185ba931f51d82783d reveals the exact location of the flaw. The file src/elements/actions/Duplicate.php was modified to add a permission check. Specifically, the _duplicateElements method, which handles the duplication logic, was missing a check to see if the user was authorized to duplicate the specified element. The patch introduced a call to $elementsService->canDuplicate($element, $user) for each element before duplication. The public method performAction calls _duplicateElements, making it the entry point for the exploitation of this vulnerability. An attacker could send a crafted request to the admin/actions/element-indexes/perform-action endpoint, which would trigger performAction on the Duplicate action class, and duplicate entries they are not supposed to have access to. The commit also patched similar authorization flaws in DeleteUsers, Restore, and SetStatus actions, indicating a broader pattern of missing permission checks.