The vulnerability stems from improper attribute filtering in query generation. The critical fix in both v6.29.0 and v7.0.0-alpha.20 addressed unsafe attribute handling (PR #15374). The release notes specifically mention 'always escape string attributes' as a fix. The attributeToSQL function in query generators is responsible for converting JavaScript attribute names to SQL identifiers. Before the patch, this function likely accepted raw user input without proper escaping, enabling SQL injection through malicious column names. The high confidence comes from: 1) Direct correlation between the CWE-790 description and attribute handling functions 2) Explicit mention of attribute escaping in the patch notes 3) The vulnerability's mitigation requiring proper input filtering at the attribute processing layer.