The vulnerability allowed unauthenticated plugin HTTP routes to receive operator-level runtime scopes. The root cause was in the createPluginRouteRuntimeClient function, which was hardcoded to grant WRITE_SCOPE to all plugin routes, irrespective of their authentication requirements. This function was called by createGatewayPluginRequestHandler, the main handler for plugin HTTP requests. As a result, any plugin route using auth: 'plugin' would be given write privileges, creating a significant security risk if a plugin exposed sensitive operations through such a route. The fix involves making the scope assignment conditional. The createPluginRouteRuntimeClient function was modified to only assign WRITE_SCOPE if the route requires gateway authentication. The createGatewayPluginRequestHandler was updated to pass the authentication requirement to createPluginRouteRuntimeClient, ensuring that unauthenticated routes operate with least privilege.