The vulnerability lies in several router handler functions within Parse Server that failed to enforce the readOnlyMasterKey restriction. The description states that readOnlyMasterKey should deny all write operations, but certain endpoints for Cloud Hooks and Cloud Jobs did not perform this check. By analyzing the patch 6c79da91fc5ec6f2a0bb69a0ca6a886c1585754f, I identified the exact locations where the authorization checks were missing. The patch adds a conditional check if (req.auth.isReadOnly) at the beginning of the handleCloudJob function in src/Routers/FunctionsRouter.js, and the handlePost and handlePut functions in src/Routers/HooksRouter.js. Before the patch, these functions would proceed with creating, updating, deleting, or running jobs/hooks even when the request was authenticated with the read-only key. Therefore, these three functions are the vulnerable functions that would appear in a runtime profile during exploitation.