The vulnerability stems from insufficient validation in the Contextual Links module's handling of user-supplied parameters. The CWE-94 (Code Injection) indicates that user input is used to dynamically generate code/classes. The ContextualController::render method and ContextualLinksManager::getContextualLinksArrayByGroup are core components that process contextual link requests. These functions likely accept parameters like 'group' identifiers that influence plugin/class resolution. Without proper validation, attackers could inject malicious values that trigger deserialization vulnerabilities or dynamic callback execution. The high confidence comes from the CWE type matching these patterns and the module's responsibility for processing contextual link parameters.