The vulnerability stemmed from an insufficient regular expression generated by the private method SilverStripe\Core\XssSanitiser::getStripAttributeContentsRegex(). This regex failed to account for backspace characters (\x08) at the beginning or end of attribute values, which could be used to bypass XSS filters. The patch directly addresses this by modifying the regex in getStripAttributeContentsRegex().
The public methods SilverStripe\Core\XssSanitiser::sanitise() and SilverStripe\Forms\HTMLEditor\HTMLEditorSanitiser::sanitise() are responsible for the actual sanitization of user-provided HTML content. They would use the (previously flawed) regex generated by getStripAttributeContentsRegex(). Therefore, these sanitise methods were the entry points where the vulnerability would manifest, as they would fail to properly neutralize malicious input containing the backspace character bypass. The updated test cases in XssSanitiserTest.php and HTMLEditorSanitiserTest.php confirm that these sanitise methods were indeed affected by this bypass technique and are now tested against it.