The vulnerability exists in the @feathersjs/authentication-oauth package, specifically within the get method of the OAuthService class. The core of the issue is an improper trust in user-provided data from the URL query string during the OAuth callback process. The application code had a fallback mechanism that, in the absence of a valid OAuth session response, would use the raw query parameters of the request as the authentication payload. This allowed an unauthenticated attacker to bypass the entire OAuth flow and directly call the callback endpoint with a forged user profile in the query parameters. The application would then mistakenly trust this forged data, leading to the creation of a valid session token for the user specified in the forged profile, resulting in a full account takeover. The patch addresses this by removing the unsafe fallback to params.query and adding a strict check to ensure a valid OAuth response is present. Any attempt to call the callback endpoint without a valid session now results in an authentication error.