The vulnerability is a SQL injection in Parse Server's PostgreSQL adapter. The root cause is improper escaping of sub-field values in dot-notation queries. The patch is located in the transformDotFieldToComponents function within src/Adapters/Storage/Postgres/PostgresStorageAdapter.js. This function is responsible for splitting dot-notation field names into components for use in SQL queries. The patch adds escaping for single and double quotes to prevent SQL injection. The commit 83f38fa clearly shows the vulnerable code being replaced with the patched version. The vulnerability can be triggered via the sort, distinct, and where query parameters when using a PostgreSQL database. The provided tests in the commit confirm that the order parameter (which maps to sort) was a valid vector for this attack.