No like you assumed The seedphrase is not passed directly into PBKDF2 as a string of words. Instead, the mnemonic phrase is first converted back to its binary bits using the BIP39 wordlist not by the function but wallet software.
So the password input to PBKDF2 is this binary string i.e entropy and checksum, not the text of the mnemonic words themselves.
You are incorrect. The
text of the mnemonic phrase is passed to the PBKDF2 function. The mnemonic phrase is
not decoded back to the entropy it encodes. As such,
anything can be passed to the PBKDF2 function. It does not have to be valid BIP-39.
From BIP-39:
To create a binary seed from the mnemonic, we use the PBKDF2 function with a mnemonic sentence (in UTF-8 NFKD) used as the password and the string "mnemonic" + passphrase (again in UTF-8 NFKD) used as the salt. The iteration count is set to 2048 and HMAC-SHA512 is used as the pseudo-random function. The length of the derived key is 512 bits (= 64 bytes).
...
Although using a mnemonic not generated by the algorithm described in "Generating the mnemonic" section is possible, ...
The only reason for decoding the phrase to its original binary is to validate the checksum.