The vulnerability is an authentication bypass caused by incorrect decorator ordering in the Flask application. In several blueprints, the @login_optionally_required decorator was applied before the @blueprint.route() decorator. According to Flask's design, the @route() decorator must be the outermost one, as it registers the function it wraps as a request handler. When the order is reversed, @route() registers the original, undecorated function, effectively ignoring the authentication check provided by @login_optionally_required. This allowed unauthenticated access to sensitive endpoints. The analysis of the provided patch commit reveals several functions across different blueprints where this decorator order was corrected, thus fixing the vulnerability for those routes. The identified vulnerable functions were responsible for handling backups (creation, download, deletion), backup restoration, and browser-step operations, all of which could be triggered by an unauthenticated attacker.