The vulnerability is a classic CORS misconfiguration where the application was configured to trust arbitrary origins. The analysis of the patch commit 424f7a0de089dce881e8bbecd220163a78e0295f confirms this. The key change is in internal/api/server.go, within the Server.Handler function. The vulnerable code, which was removed, configured the CORS middleware with AllowOriginFunc: func(origin string) bool { return true }. This line explicitly tells the server to allow requests from any origin. Furthermore, AllowCredentials: true was also set, permitting the browser to send cookies and other credentials with these cross-origin requests. This allowed a malicious website to make authenticated API calls as the victim user. The fix replaces this permissive policy with a strict allowlist controlled by the new corsAllowedOrigins configuration option. If the allowlist is empty (the default), the CORS middleware is not used at all, effectively denying all cross-origin requests.