The vulnerability lies in the HTML export feature of Quill, specifically within the formula and video formats. The html() methods in both packages/quill/src/formats/formula.ts and packages/quill/src/formats/video.ts are vulnerable. They directly embed user-provided values into HTML strings without performing the necessary escaping or sanitization. This allows an attacker to inject arbitrary HTML and JavaScript. When an application uses getSemanticHTML() or getHTML() to export content and then renders that HTML, the malicious scripts will be executed in the context of the user's browser. The analysis of the advisory and the source code of version 2.0.3 confirms that no patch is available for this vulnerability, and the functions are indeed vulnerable as described.