The vulnerability is a chain of three weaknesses that result in unauthenticated remote code execution. The analysis of the security advisory and the provided patch (commit 12e7f074d9563b3264caf9cec6e1b701c301af26) confirms this. The root cause starts with a hardcoded default JWT secret, allowing attackers to forge authentication tokens. The authenticateWebSocket function in server/middleware/auth.js is the second link; it improperly validates these tokens by not checking for the user's existence in the database, thus permitting an authentication bypass. The final and most critical vulnerability lies in the handleShellConnection function in server/index.js. This function receives data over the authenticated WebSocket and constructs shell commands by unsafely concatenating user input (projectPath, initialCommand), leading directly to OS command injection. The patch remediates these issues by removing the hardcoded secret, adding database validation to authenticateWebSocket, and rewriting handleShellConnection to properly handle user input by using cwd and validating parameters, thus preventing the injection.