The vulnerability stems from improper output encoding of the 'title' attribute in UI components. Evidence from the Gitee issue I7HDXZ shows that user-controlled 'title' values were rendered without using Layui's util.escape() method. The form module's checkbox rendering logic (and potentially other component renderers) would be responsible for handling HTML attribute values. The fix in v2.8.0 likely added sanitization to these rendering functions, as indicated by the recommendation to use util.escape in the issue discussion. While exact code diffs aren't available, the component/argument specificity in vulnerability reports and Layui's architecture strongly implicate the form rendering functions.