The vulnerability exists because the create_function in locutus directly uses the new Function() constructor with unsanitized user input, which is a well-known vector for code injection. The analysis of the patch commit 412fdb17b9b0138023eae0b32d2519ee6c547661 confirms this. The patch completely removes the create_function from the codebase, which is the most effective way to fix this vulnerability. Additionally, the var_export function was identified as a vector that could be used to trigger the vulnerability in create_function. The patch modifies var_export to no longer generate calls to the removed create_function, thus closing that attack vector as well. Both functions are therefore included in the list of vulnerable functions.