If the server is honest-but-curious, it can attempt to guess the user’s password $\mathsf{pw}$ by computing $\mathsf{rw} = H(\mathsf{pw}, H'(\mathsf{pw})^s)$,where $s$ is the server's OPRF key. Then, with this guessed value of $\mathsf{rw}$, the server can decrypt the envelope $c$ and check whether the decrypted message $m' = \mathsf{AuthDec}_{\mathsf{rw}}(c)$ contains the user’s public key $P_u$. This would allow the server to verify if the guessed password is correct, even without directly deviating from the protocol.
Let me first ask if I'm missing something here; otherwise, my question is
Is the role of the OPRF in OPAQUE merely to prevent the server from storing plaintext information to avoid precomputation attacks, but not to ensure that the server cannot learn the user's password?