The vulnerability lies in the incorrect handling of authentication denial within the openvpn-auth-oauth2 plugin's experimental mode. The root cause was identified in the handleAuthUserPassVerify function located in lib/openvpn-auth-oauth2/openvpn/handle.go. When a client that does not support web authentication attempts to connect, the plugin's logic correctly determines that the client should be denied. However, instead of returning an error code to the OpenVPN server, it returned OPENVPN_PLUGIN_FUNC_SUCCESS. The OpenVPN server treats this success code as an approval for connection, thus bypassing the authentication mechanism entirely. The patch in commit 36f69a6c67c1054da7cbfa04ced3f0555127c8f2 rectifies this by changing the return value to OPENVPN_PLUGIN_FUNC_ERROR in the case of a client denial, ensuring that the OpenVPN server correctly terminates the connection attempt. This makes handleAuthUserPassVerify the direct location of the vulnerability.