The security vulnerability is a bypass of the requestKeywordDenylist in Parse Server. The root cause is a logical flaw in the Utils.objectContainsKeyValue function, which was responsible for scanning incoming request data for prohibited keywords. The function used a recursive approach to traverse nested objects. However, it would prematurely exit the scanning loop after processing the first nested object it encountered, failing to check any other keys at the same level. The patch replaces this flawed recursive logic with an iterative, stack-based approach. This ensures that all keys within the request payload are scanned, regardless of their position relative to nested objects, thus closing the bypass vulnerability. The primary vulnerable function is Utils.objectContainsKeyValue as it contains the flawed logic.