The vulnerability stems from improper input sanitization in hosting plan management endpoints. The patch shows critical changes to validation patterns:
- For 'name' field: Added REGEX_DESC_TEXT validation where none existed before
- For 'description' field: Upgraded from REGEX_DESC_TEXT to stricter REGEX_CONF_TEXT
Both add() and update() methods process user-controlled 'name' and 'description' fields that get persisted and rendered in web interfaces. Without proper validation, these fields could store malicious scripts. The direct correlation between the vulnerability description, CWE-79 classification, and the specific validation fixes in these methods provides high confidence in their identification.