The vulnerability allows an attacker with a readOnlyMasterKey to gain full read and write access by impersonating any user through the /loginAs endpoint. The analysis of the provided patches confirms this. The fix is located in the parse-community/parse-server repository, specifically in pull request #10099, which corresponds to commit de09d673d904b70e91cc2ef284184713d34170bf. The commit modifies src/Routers/UsersRouter.js by adding an authorization check within the handleLoginAs method. This method is the handler for the /loginAs route. The added code explicitly checks if the request is made using a read-only key (req.auth.isReadOnly) and, if so, denies the operation. This indicates that prior to the patch, handleLoginAs was the vulnerable function as it lacked this critical authorization check, leading to a privilege escalation vulnerability.