The vulnerability is a classic SQL injection flaw within the kysely query builder library, specifically affecting the MySQL and SQLite dialects when constructing JSON path queries. The analysis of the security advisory and the associated patch commit (0a602bff2f442f6c26d5e047ca8f8715179f6d24) points directly to the visitJSONPathLeg method in the DefaultQueryCompiler class as the source of the vulnerability. The advisory explicitly mentions that this function appends user-controlled values without escaping, and the patch confirms this by replacing the direct append operation (this.append(String(node.value))) with a conditional sanitization (this.sanitizeStringLiteral(node.value)). This function is called when building a query that uses JSON path accessors like .key() or .at(). An attacker can supply a malicious string to these methods, which is then processed by visitJSONPathLeg, leading to the injection. Therefore, any runtime profile during an exploit of this vulnerability would show DefaultQueryCompiler.visitJSONPathLeg in the stack trace as it processes the malicious input.