The vulnerability exists in the WriteMetadata function within pkg/modules/exiftool/exiftool.go. The root cause is improper input validation, specifically the failure to sanitize metadata values before passing them to the exiftool command-line utility. The vulnerability description explicitly points out that while metadata keys were sanitized, the values were not. An attacker could craft a metadata value with a newline character (\n) to inject arbitrary command-line arguments into the exiftool process. This could lead to arbitrary file operations on the server, such as moving, renaming, or creating symlinks, as demonstrated in the vulnerability report. The provided patch confirms this analysis by introducing a new function, validateMetadataValue, to sanitize these values by checking for control characters. This new validation is applied directly within the WriteMetadata function, confirming it as the location of the vulnerability.