The vulnerability lies in the edit_article.jsp file where the backURL parameter is rendered without proper escaping. The patch eded63b8822923f9392d94ba1818beb63629b79f shows that the output of journalEditArticleDisplayContext.getBackURL() was not escaped before being used in an href attribute. The fix involves wrapping the call to getBackURL() with PortalUtil.escapeRedirect(). This indicates that the getBackURL() method is the source of the tainted data. While the exact file path and full class name of JournalEditArticleDisplayContext are not provided in the commit details, the method call journalEditArticleDisplayContext.getBackURL() is explicitly shown in the patch. This method is responsible for retrieving the backURL parameter, which can be controlled by an attacker. The vulnerability is triggered when a user visits a crafted URL with a malicious backURL parameter, causing the injected script to be executed in the context of the user's session.