The vulnerability exists in the XWiki Blog Application, where a stored Cross-Site Scripting (XSS) vulnerability was identified in the handling of blog post titles. The root cause of the vulnerability was the improper escaping of the post title before it was rendered inside an HTML <title> tag on the blog's home page. The analysis of the provided patch commit cca87f0a0edc2e7e049d46d51f4a4d8f78b714ba clearly points to the vulnerable code. The file application-blog-ui/src/main/resources/Blog/BlogCode.xml contains a Velocity macro named displayEntryTitle. Before the patch, this macro used $services.rendering.escape to process the title, but this was insufficient as it did not escape characters that have special meaning in HTML. The fix involves wrapping the output with $escapetool.html(), which correctly neutralizes potentially malicious input by escaping it for an HTML context. Therefore, the displayEntryTitle macro is the specific function that processes the malicious input and is the source of the vulnerability.