The document.scripts access in util-path.js can be clobbered via attacker-controlled HTML elements with name='scripts'
getScriptAbsoluteSrc() blindly trusts the src attribute of the clobbered element
This combination allows attackers to control the script loading path through DOM Clobbering, leading to XSS via malicious script imports. The GitHub Gist PoC demonstrates this by injecting <img> elements to hijack the module loader's resource resolution.