The vulnerability described is a time-based user enumeration issue in PrestaShop's customer authentication. By analyzing the patches, I identified the exact commit that addresses this vulnerability. The commit c4b32c60e6a47bf86712852a96822efdc7a6d660 modifies the getByEmail function in classes/Customer.php. The changes in this function clearly show the mitigation strategy for the timing attack. Specifically, the code was altered to prevent early exit when a user is not found. Instead of returning immediately, the patched code now generates a fake password hash and a fake user result, ensuring that the function's execution time is consistent whether the user exists or not. This directly points to Customer::getByEmail as the vulnerable function, as its original implementation allowed for the timing discrepancy that could be exploited for user enumeration.