The vulnerability is a stored cross-site scripting (XSS) issue in the related asset selector of Liferay Portal. The provided patch fdf7044813a8acb9536b01904177ddd44151a6f6 clearly shows that the user name was not being escaped before being displayed. The file modules/apps/item-selector/item-selector-web/src/main/java/com/liferay/item/selector/web/internal/DefaultTableItemView.java was modified to add HTML escaping to the user name. The change is within the getSearchEntries method, which is responsible for preparing the data to be displayed in the asset selector. An attacker could create a user with a malicious script in their first, middle, or last name. When this user is associated with an asset, and that asset is viewed in the related asset selector, the script would execute in the browser of the user viewing the asset. The vulnerable function is com.liferay.item.selector.web.internal.DefaultTableItemView.getSearchEntries because it processes the user's name without proper sanitization, which is then rendered in the UI, leading to the XSS vulnerability.