The vulnerability stems from improper handling of PHP class inheritance in TYPO3's Salted Password system. When MD5 is the default hashing algorithm, the system incorrectly allows Blowfish-hashed passwords to be overridden due to shared parent classes in the hashing method implementations. The SaltFactory::getHashing method is central to selecting the hashing algorithm, and CompatibilityHashService::checkPassword handles password verification. Both functions would need to misuse inheritance checks (e.g., is_subclass_of or instanceof) to allow cross-algorithm validation. The high confidence comes from the vulnerability's direct link to class inheritance in password hashing logic, as described in the advisory.