The vulnerability lies in an authorization bypass within the resend-verification-code endpoints for UserWhatsApp, UserCall, UserEmail, and UserSms. The advisory and the patch commit ea57608ca677962e3664e66c498aba85856ab7dc clearly show that these endpoints lacked a critical ownership check. An authenticated attacker could provide the itemId of any user's contact method and trigger a verification code resend. The vulnerable functions are the anonymous route handlers within the API classes (UserWhatsAppAPI, UserCallAPI, UserEmailAPI, UserSmsAPI) that were responsible for handling these requests. The patch remediated this by adding logic to fetch the item associated with the itemId and verifying that its userId matches the ID of the authenticated user making the request. The analysis identified the anonymous functions within the constructors of these API classes as the precise location of the vulnerability.