The vulnerability described is a path traversal within the FileStateSessionBackend. The advisory points to the _make_file_path function in mesop/server/state_session.py as the source of the vulnerability. To confirm this and identify the exact function signature, I first identified the patched version (1.2.3) and the last vulnerable version (1.2.2) from the advisory. By comparing the git tags for these versions in the mesop-dev/mesop repository, I located the commit that introduced the fix: c6b382f363b73ac32c402a2db3aadc7784f66a5b. The diff in this commit clearly shows changes to the _make_file_path function in mesop/server/state_session.py. The original code return self.base_dir / (self.prefix + token) was removed. This line is the vulnerability, as it combines a base path with an unsanitized user-provided token. The patch adds validation to the token using a regular expression and resolves the path to ensure it remains within the base directory, thus mitigating the path traversal risk. Therefore, the FileStateSessionBackend._make_file_path function is the precise location of the vulnerability.