The vulnerability manifests in the page creation endpoint (_core/admin/pages/add/) through the titles[en] parameter. Stored XSS typically requires both: 1) insufficient input sanitization during data storage, and 2) unsafe output rendering. While the exact code isn't available, the advisory specifically identifies the administrative page creation path as the injection point. In MVC-based CMS architectures like Subrion, this would correspond to a controller action handling form submissions. The high confidence comes from the precise parameter (titles[en]) and endpoint location being documented, combined with the standard pattern of XSS vulnerabilities in form handlers that lack proper input sanitization.