The vulnerability exists in the getMultipartFile function located in services/storage/controller/upload_files.go. The root cause of the vulnerability is that the application trusts the Content-Type header sent by the client. The code explicitly checks for the Content-Type header and, if it's not empty or application/octet-stream, it uses the client-provided value directly, skipping server-side MIME type detection. This allows an attacker to upload a file with a misleading MIME type (e.g., uploading an executable file as image/jpeg). The provided patch c4bd53f042d7f568e567e18e2665af81660fce85 confirms this by removing the code block that trusts the client header and ensuring that mimetype.DetectReader is always called to determine the file's true MIME type from its content. Therefore, Controller.getMultipartFile is the vulnerable function that would appear in a runtime profile during exploitation.